Sources of counterfeit components include manufacturers, developers, vendors, and contractors. Anti-counterfeiting policies and procedures support tamper resistance and provide a level of protection against the introduction of malicious code. External reporting organizations include CISA.
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | 
|---|---|---|---|---|
| SR-11 | Component Authenticity | Protects | T1059.002 | AppleScript | 
| SR-11 | Component Authenticity | Protects | T1204.003 | Malicious Image | 
| SR-11 | Component Authenticity | Protects | T1505 | Server Software Component | 
| SR-11 | Component Authenticity | Protects | T1505.001 | SQL Stored Procedures | 
| SR-11 | Component Authenticity | Protects | T1505.002 | Transport Agent | 
| SR-11 | Component Authenticity | Protects | T1546.006 | LC_LOAD_DYLIB Addition | 
| SR-11 | Component Authenticity | Protects | T1554 | Compromise Client Software Binary | 
| SR-11 | Component Authenticity | Protects | T1601 | Modify System Image | 
| SR-11 | Component Authenticity | Protects | T1601.001 | Patch System Image | 
| SR-11 | Component Authenticity | Protects | T1601.002 | Downgrade System Image |