Sources of counterfeit components include manufacturers, developers, vendors, and contractors. Anti-counterfeiting policies and procedures support tamper resistance and provide a level of protection against the introduction of malicious code. External reporting organizations include CISA.
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
|---|---|---|---|---|
| SR-11 | Component Authenticity | Protects | T1059.002 | AppleScript |
| SR-11 | Component Authenticity | Protects | T1505 | Server Software Component |
| SR-11 | Component Authenticity | Protects | T1546.006 | LC_LOAD_DYLIB Addition |
| SR-11 | Component Authenticity | Protects | T1204.003 | Malicious Image |
| SR-11 | Component Authenticity | Protects | T1505.001 | SQL Stored Procedures |
| SR-11 | Component Authenticity | Protects | T1505.002 | Transport Agent |
| SR-11 | Component Authenticity | Protects | T1505.004 | IIS Components |
| SR-11 | Component Authenticity | Protects | T1554 | Compromise Client Software Binary |
| SR-11 | Component Authenticity | Protects | T1601 | Modify System Image |
| SR-11 | Component Authenticity | Protects | T1601.001 | Patch System Image |
| SR-11 | Component Authenticity | Protects | T1601.002 | Downgrade System Image |