Trusted Supply Chain

Trusted Supply Chain
Trusted Supply Chain

How we implement security from design through production

Going the extra mile to protect quality

We go the extra mile to protect our supply chain and manufacturing processes. This way, our customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.

Secure Manufacturing and Design Integrity

We provide robust mechanisms to protect our manufacturing facilities and mitigate any insider threats. Employees are subject to background checks before they are allowed to work on the manufacturing floor. Based on customer requirements, product is manufactured at sites accredited to handle ITAR information, and employees at these locations are ITAR cleared. As well, we have U.S. manufacturing sites that are secure facilities capable of handling classified data and components. What’s more, to ensure design integrity throughout the product development process, Curtiss-Wright has facilities compliant to the U.S. DoD’s Risk Management Framework (RMF). This framework provides controls for the engineering environment to manage and mitigate unauthorized access, modification, loss, or theft of critical design information.

Meeting Program Schedules in a Time of Supply-chain Uncertainty

These days, program managers are trying to figure out how best to mitigate the potentially harmful effects of supply-chain disruption, while protecting their customer’s program schedule and supporting the warfighter. How do commercial off-the-shelf (COTS) suppliers solve longevity and obsolescence problems – not just now, in this time of supply-chain uncertainty, but in general?

Counterfeit Parts Mitigation

The most important starting point for establishing a secure supply chain is ensuring the integrity of every part and component. That’s why we only buy components directly from franchise sources, from the components’ Original Equipment Manufacturer (OEM), or through the OEM’s authorized distribution channel. Once a component is no longer available through franchise sources, we employ industry leading anti-counterfeit controls.

We stay on top of new and evolving regulatory standards, implementing controlled processes designed to prevent counterfeit parts from entering the supply chain at any point in the product life cycle. Our SAE AS5553 (Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition) compliant process uses approved vendors who have been audited and monitored to ensure their authenticity and provide an audit trail for all components. We’re also compliant with SAE AS6174 (Counterfeit Materiel; Assuring Acquisition of Authentic and Conforming Materiel) standard, which now includes non-electrical component counterfeit mitigation.

Establishing a Trusted Supply Chain

In this paper, we look at the best practices commercial off-the-shelf (COTS) hardware vendors must employ for establishing a trusted supply chain, including those regarding managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.

The Curtiss-Wright Advantage

Our technology solutions extend Trusted Computing best practices to every part of the development process, from design and testing to supply chain and manufacturing. The highest possible levels of protection are built into every aspect of solution development to increase the overall value that COTS solutions can provide in a secure system. Curtiss-Wright takes a holistic view of Trusted Computing, going above and beyond the efforts of other vendors to apply the advanced protection capabilities needed to develop truly secure COTS solutions. It’s one of the main reasons the company has been a trusted, proven leader in the global defense and aerospace industries for decades.

 

Best practices for COTS supplier counterfeit mitigation

Leading commercial off-the-shelf (COTS) vendors and military/aerospace electronics suppliers routinely engage with customers and suppliers in the development and maintenance of internal processes for the mitigation and prevention of counterfeit electronics components. Many of the best practices for counterfeit mitigation – including methods, systems, and trend monitoring – result from participation in industry committees.

Read the Article

Data Protection Domains

Data-at-Rest-Encryption  
Data-at-Rest-Encryption

Curtiss-Wright offers proven and certified COTS storage solutions that match data security requirements, including NSA Type 1, CSfC, CC and FIPS 140-2.

Data-In-Motion Encryption  
Data-In-Motion Encryption

Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.

TrustedCOTS Processing Solutions  
TrustedCOTS Processing Solutions

Our TrustedCOTS products provide confidence in the security and un-compromised protections.