Sourcing and Manufacturing Security
How Products are Made Matters
Security is more complex than antivirus or memory protections. Attack surface can include third-party components or the physical alteration of hardware in manufacturing.
Our sourcing and manufacturing practices are built on decades of experience and aligned to industry-leading processes -- many we helped establish.
From suppliers and raw materials, to world-class manufacturing and secure delivery, nobody has more expertise driving secure supply chain and manufacturing practices.
Understanding the Risks
Risks exist throughout the product lifecycle. Each stage can present distinct risks, while some are present throughout. Examples by stage include:
- Nonconforming parts and materials
- Responsibly sourced minerals
- Quality, functional, security issues
- Process gaps
- Supplier risk
- Faulty, inadequate, or misused design tools
- Architectural and design vulnerabilities
- Unintended consequences of intentional design changes
- Compromised or stolen secrets
- Outsourced supplier risk
- Outsourced IP tampering
- Network and system vulnerabilities
- Unauthorized facility access
- Business continuity
- Infrastructure availability
- Unauthorized changes to machine settings
- Improper configuration of factory options
- Incomplete testing
- Third-party support and maintenance risk
- Freight theft
- Tampering
- False description
- Product substitution
- Counterfeiting
- Third-party provider risk
A Comprehensive Approach to Managing the Risks
Our risk mitigation controls are tailored to today’s security challenges. We apply robust strategies for quality assurance and supply chain security.
Design, Sourcing, and Procurement
Risk management across the supply chain guides supplier selection, conformance to industry certifications and standards, and continuous quality management.
Manufacture, Assembly, and Test
Statistical monitoring, audits, proprietary algorithms plus unit-level traceability to detect issues and mitigate risks all contribute to improved security throughout the manufacturing process.
Distribution and Customer Delivery
Advanced provenance/surveillance technologies help mitigate counterfeiting risk, helping enable the secure storage and transport of our products to customers.
Securing Your Business Throughout the Supply Chain
Security Practices Designed with You in Mind
Supply chain and manufacturing creates a fundamental level of security in our products.
Learn about security in design and support, so that no matter what you get from Intel, you can be confident it was developed to deliver optimal security.
Intel Alignment to Global Standards
A key aspect of our supply chain and manufacturing security is alignment with industry standards. Highlights include:
International Organization for Standardization (ISO)
- ISO 9001:2015 Certification covering Quality Management Systems
- ISO 27001 Certification covering Information Security Management
- ISO 27000 Series covering Information security management systems, controls, and risk management
- ISO 28000 series covering security management systems for the supply chain
National Institute of Standards and Technology (NIST)
- Original partner to NIST National Cybersecurity Center of Excellence (NCCOE)
- NIST 800 Series (53, 161, 171) covering:
- Security and Privacy Controls for Information Systems and Organizations
- Supply Chain Risk Management Practices for Federal Information Systems and Organizations
- Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Transported Asset Protection Association (TAPA)
- TAPA Facility Security Requirements (FSRs)
- TAPA Truck Security Requirements (TSRs)
U.S. Customs Trade Partnership Against Terrorism: Tier III Certified
Industry influence is one reason that Intel has been a mainstay in the Gartner Supply Chain ranking. Intel is #6 for 2021, marking our tenth straight year in the Top 10!
Compute Lifecycle Assurance: Supply Chain and Beyond
Compute Lifecycle Assurance (CLA) was developed with key initiatives to extend trust throughout the product lifecycle. This includes Transparent Supply Chain, providing visibility from manufacture to deployment. Measurements taken at the factory of origin give IT a simple way to check and validate integrity.