T1195.003 Compromise Hardware Supply Chain Mappings

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
CA-8 Penetration Testing Protects T1195.003 Compromise Hardware Supply Chain
CM-3 Configuration Change Control Protects T1195.003 Compromise Hardware Supply Chain
CM-5 Access Restrictions for Change Protects T1195.003 Compromise Hardware Supply Chain
CM-8 System Component Inventory Protects T1195.003 Compromise Hardware Supply Chain
IA-7 Cryptographic Module Authentication Protects T1195.003 Compromise Hardware Supply Chain
RA-9 Criticality Analysis Protects T1195.003 Compromise Hardware Supply Chain
SA-10 Developer Configuration Management Protects T1195.003 Compromise Hardware Supply Chain
SA-11 Developer Testing and Evaluation Protects T1195.003 Compromise Hardware Supply Chain
SC-34 Non-modifiable Executable Programs Protects T1195.003 Compromise Hardware Supply Chain
SI-2 Flaw Remediation Protects T1195.003 Compromise Hardware Supply Chain
SI-7 Software, Firmware, and Information Integrity Protects T1195.003 Compromise Hardware Supply Chain
action.hacking.vector.Partner Partner connection or credential. (Indicates supply chain breach.) related-to T1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain
action.social.vector.Partner Partner connection or credential. (Indicates supply chain breach.) related-to T1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain