Sources of counterfeit components include manufacturers, developers, vendors, and contractors. Anti-counterfeiting policies and procedures support tamper resistance and provide a level of protection against the introduction of malicious code. External reporting organizations include CISA.
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
SR-11 | Component Authenticity | Protects | T1059.002 | AppleScript |
SR-11 | Component Authenticity | Protects | T1204.003 | Malicious Image |
SR-11 | Component Authenticity | Protects | T1505 | Server Software Component |
SR-11 | Component Authenticity | Protects | T1505.001 | SQL Stored Procedures |
SR-11 | Component Authenticity | Protects | T1505.002 | Transport Agent |
SR-11 | Component Authenticity | Protects | T1546.006 | LC_LOAD_DYLIB Addition |
SR-11 | Component Authenticity | Protects | T1554 | Compromise Client Software Binary |
SR-11 | Component Authenticity | Protects | T1601 | Modify System Image |
SR-11 | Component Authenticity | Protects | T1601.001 | Patch System Image |
SR-11 | Component Authenticity | Protects | T1601.002 | Downgrade System Image |