Obtain or create malicious capabilities inside hardware or software intended to be used in a specific project. Injecting the malicious HW/SW in the right place is difficult, is also difficult being sure that the part will be integrated in a system. [1]
ID | Mitigation | Description |
---|---|---|
M1045 | Code signing | |
M2024 | Supply chain confidence |