Trusted Computing: the COTS Perspective Series
When it’s time to procure the technology your system will comprise, there’s more to evaluate than just Trusted Computing capabilities to ensure you’re selecting trusted, secure solutions. Trust must be embedded throughout all stages of the supply chain to provide customers, distributors, and suppliers high-quality products that can be fully confident.
In this paper, we’ll look at the best practices commercial off-the-shelf (COTS) hardware vendors must employ for establishing a trusted supply chain, including those regarding managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
Log in and download the white paper to read about:
- Characteristics of a secure supply chain
- Conditions to use brokers
- Counterfeit parts mitigation