T1474.002 Compromise Hardware Supply Chain
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
Mitigations
ID |
Mitigation |
Description |
M1001 |
Security Updates |
Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications. |
Detection