Going the extra mile to protect quality
We go the extra mile to protect our supply chain and manufacturing processes. This way, our customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.
Secure Manufacturing and Design Integrity
We provide robust mechanisms to protect our manufacturing facilities and mitigate any insider threats. Employees are subject to background checks before they are allowed to work on the manufacturing floor. Based on customer requirements, product is manufactured at sites accredited to handle ITAR information, and employees at these locations are ITAR cleared. As well, we have U.S. manufacturing sites that are secure facilities capable of handling classified data and components. What’s more, to ensure design integrity throughout the product development process, Curtiss-Wright has facilities compliant to the U.S. DoD’s Risk Management Framework (RMF). This framework provides controls for the engineering environment to manage and mitigate unauthorized access, modification, loss, or theft of critical design information.
Meeting Program Schedules in a Time of Supply-chain Uncertainty
These days, program managers are trying to figure out how best to mitigate the potentially harmful effects of supply-chain disruption, while protecting their customer’s program schedule and supporting the warfighter. How do commercial off-the-shelf (COTS) suppliers solve longevity and obsolescence problems – not just now, in this time of supply-chain uncertainty, but in general?
Counterfeit Parts Mitigation
The most important starting point for establishing a secure supply chain is ensuring the integrity of every part and component. That’s why we only buy components directly from franchise sources, from the components’ Original Equipment Manufacturer (OEM), or through the OEM’s authorized distribution channel. Once a component is no longer available through franchise sources, we employ industry leading anti-counterfeit controls.
We stay on top of new and evolving regulatory standards, implementing controlled processes designed to prevent counterfeit parts from entering the supply chain at any point in the product life cycle. Our SAE AS5553 (Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition) compliant process uses approved vendors who have been audited and monitored to ensure their authenticity and provide an audit trail for all components. We’re also compliant with SAE AS6174 (Counterfeit Materiel; Assuring Acquisition of Authentic and Conforming Materiel) standard, which now includes non-electrical component counterfeit mitigation.
Establishing a Trusted Supply Chain
In this paper, we look at the best practices commercial off-the-shelf (COTS) hardware vendors must employ for establishing a trusted supply chain, including those regarding managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
The Curtiss-Wright Advantage
Our technology solutions extend Trusted Computing best practices to every part of the development process, from design and testing to supply chain and manufacturing. The highest possible levels of protection are built into every aspect of solution development to increase the overall value that COTS solutions can provide in a secure system. Curtiss-Wright takes a holistic view of Trusted Computing, going above and beyond the efforts of other vendors to apply the advanced protection capabilities needed to develop truly secure COTS solutions. It’s one of the main reasons the company has been a trusted, proven leader in the global defense and aerospace industries for decades.
Best practices for COTS supplier counterfeit mitigation
Leading commercial off-the-shelf (COTS) vendors and military/aerospace electronics suppliers routinely engage with customers and suppliers in the development and maintenance of internal processes for the mitigation and prevention of counterfeit electronics components. Many of the best practices for counterfeit mitigation – including methods, systems, and trend monitoring – result from participation in industry committees.
Data Protection Domains
Curtiss-Wright offers proven and certified COTS storage solutions that match data security requirements, including NSA Type 1, CSfC, CC and FIPS 140-2.
Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.