GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Validating the Integrity of Computing Devices

To provide reusable solutions, technologies today rely on complex, globally distributed, and interconnected supply chain ecosystems. Organizations are increasingly vulnerable to intentional or unintentional cyber supply chain compromise. Managing cyber supply chain risks necessitates, ensuring the supply chain’s integrity, quality, and resilience, as well as its products and services.

This report shows how businesses can ensure that the internal components of their computing devices are genuine and have not been tampered with during the manufacturing or distribution processes.



  • Author(s):
  • Jon Boyens
  • Tyler Diamond
  • Christopher Brown
  • Chelsea Deane
  • Nakia Grayson
  • Nakia Grayson
  • Jason Hurlburt
  • Celia Paulsen
  • William T. Polk
  • Andrew Regenscheid
  • Karen Scarfone
  • Murugiah Souppaya
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Validating the Integrity of Computing Devices
  • White Paper
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:December 22, 2022
License:Public Domain

Featured Content

Contact Publisher

Claim Content