Hardware Security

Hardware Supply Chain Trust Boundaries

Hardware travels through dozens of hands before reaching your data center. Understanding and enforcing trust boundaries across the hardware supply chain is essential for building secure systems.

Alex
Security Analyst
6 min read

A server in your data center contains components from dozens of manufacturers, assembled in factories across multiple countries, shipped through international logistics chains, and handled by numerous intermediaries. At any point in this chain, hardware can be modified, replaced, or implanted with malicious components.

Software supply chain security gets most of the attention, but the hardware underneath it all has its own supply chain -- one that's arguably harder to secure.

The Hardware Supply Chain

A simplified path for a server reaching your rack:

  1. Raw materials: Silicon wafers, metals, plastics sourced globally.
  2. Component manufacturing: CPUs, memory, storage controllers produced by specialized fabs.
  3. Board manufacturing: PCBs assembled with components, often by ODMs in Asia.
  4. System integration: Boards assembled into server chassis with power supplies, fans, and cabling.
  5. Distribution: Servers shipped to regional distributors.
  6. Resale: Distributors sell to resellers or directly to customers.
  7. Logistics: Multiple shipping and handling steps.
  8. Deployment: Hardware arrives at the data center and is racked.

Each handoff is a trust boundary crossing. Each crossing is an opportunity for tampering.

Trust Boundary Threats

Interdiction

Intelligence agencies have been documented intercepting hardware shipments to implant monitoring devices. The NSA's Tailored Access Operations (TAO) reportedly intercepted networking equipment in transit and installed persistent implants before resealing the packages.

This isn't limited to nation-states. Criminal organizations and competitors can also intercept shipments, especially when logistics chains are complex and involve multiple intermediaries.

Counterfeit Components

Counterfeit electronic components are a massive problem:

  • The US Department of Commerce documented over 8,000 counterfeit incidents across defense and commercial sectors.
  • Counterfeit components may have different specifications, reduced reliability, or modified functionality.
  • Recycled components from e-waste are sometimes re-marked and sold as new.
  • Counterfeit components can be intentionally designed to include backdoors.

Factory-Level Compromise

Compromise at the manufacturing level is the hardest to detect:

  • Malicious modifications can be built into the silicon die itself.
  • Additional circuits can be added to PCBs during assembly.
  • Firmware can be modified before it's flashed to components.
  • Test and debug interfaces may be left enabled for unauthorized access.

Refurbished Equipment

Refurbished and secondary-market hardware presents additional risks:

  • No guarantee of chain of custody.
  • Firmware may have been modified by previous owners.
  • Hardware modifications may be present from previous use.
  • Components may have been swapped with counterfeit or lower-specification parts.

Establishing Trust Boundaries

Procurement Controls

Authorized channels: Purchase hardware only from authorized distributors and resellers. Avoid gray market or unverified sources.

Vendor assessment: Evaluate hardware vendors on their supply chain security practices:

  • Where are components manufactured?
  • What quality control processes exist?
  • How are components authenticated?
  • What is the chain of custody from factory to customer?

Purchase orders and contracts: Include supply chain security requirements in procurement contracts:

  • Tamper-evident packaging requirements.
  • Component traceability requirements.
  • Right to audit manufacturing facilities.
  • Incident notification obligations.

Physical Security

Tamper-evident packaging: Require tamper-evident packaging for all hardware shipments. Inspect packaging upon receipt for signs of tampering.

Sealed chassis: Use servers with tamper-evident chassis seals. Record and verify seal numbers.

Secure shipping: Use tracked, direct shipping where possible. Minimize the number of intermediaries and handoffs.

Secure storage: Store undeployed hardware in physically secure locations with access controls and surveillance.

Component Authentication

Hardware attestation: Components with TPMs or similar trust anchors can attest to their identity and integrity. Verify attestation at deployment.

Serial number tracking: Maintain a database of component serial numbers and verify them at each stage from procurement to deployment.

Visual inspection: For high-security deployments, physically inspect boards and components for unexpected modifications. X-ray inspection can detect hidden implants.

Electrical testing: Verify that components meet their specified electrical characteristics. Counterfeit or modified components may behave differently under testing.

Firmware Verification at Deployment

Before deploying new hardware:

  1. Compare firmware versions: Verify that firmware matches the vendor's published versions.
  2. Check firmware hashes: Compare firmware hashes against vendor-published values.
  3. Scan for known vulnerabilities: Run firmware security scanners.
  4. Verify Secure Boot configuration: Ensure Secure Boot is properly configured with correct keys.
  5. Check BMC configuration: Verify BMC firmware and default configurations.

Runtime Trust Verification

Trust boundaries must be enforced continuously, not just at deployment:

Measured boot: Use TPM-based measured boot to verify the integrity of the boot chain at every startup.

Runtime attestation: Periodically verify hardware attestation to detect firmware modifications.

Behavioral monitoring: Monitor hardware behavior for anomalies that might indicate compromise:

  • Unexpected network traffic from management interfaces.
  • Unusual power consumption patterns.
  • Unexpected DMA activity.

Network Segmentation

Different hardware trust levels should be on different network segments:

  • Management networks: BMC and IPMI interfaces isolated from production traffic.
  • High-security zones: Hardware with verified provenance for sensitive workloads.
  • Standard zones: General-purpose hardware with standard verification.
  • Quarantine zones: New or unverified hardware pending verification.

Supply Chain Transparency Initiatives

Open Compute Project (OCP)

The Open Compute Project promotes open hardware designs, increasing transparency in hardware supply chains. Organizations can inspect and verify the designs of the hardware they purchase.

NIST SP 800-161

NIST's supply chain risk management publication provides a comprehensive framework for managing hardware and software supply chain risks in federal systems. Its principles are applicable to commercial organizations as well.

C-SCRM

Cyber Supply Chain Risk Management practices are being formalized through standards and frameworks. ISO 28000 addresses supply chain security management, while SAE AS6171 specifically addresses counterfeit electronics prevention.

Practical Implementation

For most organizations, full hardware supply chain verification is resource-intensive. Prioritize based on risk:

Tier 1 (Full verification): Hardware handling the most sensitive data or critical infrastructure. Full provenance verification, firmware scanning, and continuous monitoring.

Tier 2 (Standard verification): General enterprise hardware. Authorized procurement channels, basic firmware verification, tamper-evident packaging.

Tier 3 (Basic controls): Non-critical hardware. Authorized procurement and standard deployment procedures.

How Safeguard.sh Helps

Safeguard.sh extends its supply chain visibility framework to encompass hardware trust boundaries alongside software composition. By maintaining comprehensive SBOMs that include firmware and embedded software components, Safeguard.sh enables organizations to track the full technology stack from hardware through application. The platform's continuous monitoring detects when vulnerabilities are disclosed in firmware components within your inventory, while policy gates enforce security requirements across your entire supply chain. This unified approach ensures hardware supply chain risks are managed with the same rigor as software dependencies.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.