Institute for Defense Analyses4850 Mark Center Drive Alexandria, Virginia 22311-1882
Supply Chain Risk Management (SCRM)
Brian S. Cohen
U.S. GOVERNMENT PUBLISHING OFFICE
WASHINGTON :
For sale by the Superintendent of Documents, U.S. Government Publishing Office
A DARPA Approach to Trusted Microelectronics
To ensure the integrity of critical military systems, Department of Defense Instruction (DoDI) 5200.44 requires that DoD manage risks to the supply and security of certain microelectronic components. Under this Instruction, DoD must provide specific protections—including detecting, avoiding, and mitigating potential threats—based on a component’s military importance (criticality).1 The security environment is fluid, however. Variations in the use and importance of each device, changes in the supplier base, new adversary threats, and the availability of effective threat countermeasures each drive changes in DoD’s security needs. Further, no single security solution can provide complete protection for the full range of critical components. That level of protection will take a flexible, technologically-driven, portfolio-based approach to addressing the risks faced.
THE GUIDEBOOK ON TRUST
HOW TO PROCURE TRUSTED ASICS FROM ACCREDITED SOURCES
DISCLAIMER: This Guidebook is intended to assist stakeholders seeking to understand implementation of the Trusted Accredited supplier program and is not a substitute for stakeholder’s seeking their own legal counsel to comply with legal requirements. Neither the TSSG nor its member companies are responsible for the interpretations expressed in this Guidebook.
National Computer Security Center
A Guide to Understanding Security Modeling in Trusted Systems
20010802 090
DoD TSN Update
2013/02/12 | Page-1 Distribution Statement A – Approved for public release by OSR on 02/06/13, SR Case # 13-S-1033 applies.
DoD Trusted Systems and Networks (TSN) Update