| ID | Name |
|---|---|
| T1474.001 | Compromise Software Dependencies and Development Tools |
| T1474.002 | Compromise Hardware Supply Chain |
| T1474.003 | Compromise Software Supply Chain |
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
| ID | Mitigation | Description |
|---|---|---|
| M1001 | Security Updates |
Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0013 | Sensor Health | Host Status |
Integrity checking mechanisms can potentially detect unauthorized hardware modifications. |