Controlling access to the data and processing within any facility is a core task, and for some it is 100% mission critical.

Unfortunately, talking about ‘known and unknown threats’ can make you sound like a conspiracy-theorist-prepper. However, the issues are real and confront data center teams every day.

39%

According to a Dept. of Commerce survey, 39% of organizations encountered counterfeit electronics in a four-year period, and the number is increasing.

Leno-no

In 2016, the US Dept. of Defense and DHS warned against the use of Lenovo equipment due to concerns over cyber-spying.

Hardware security threats

Antagonists love hardware

Historically software has been the preferred vehicle for antagonists, but in recent years there is a demonstrable trend toward appliances and firmware as the breaches here create opportunities that may go unnoticed for years.

Everybody’s doing it

There is a relentless stream of players seeking unauthorized access, from rogue individuals to nation-states and their instruments, including ‘friendly fire.’ Public discourse in the media seldom reveals these complexities.

Manufacturers are exposed

Consider that just one appliance from any major IT brand can have numerous sub-manufacturers, each using components from a multitude of international suppliers. Then consider that every stage, from design through component supply, manufacturing, coding and assembly, presents opportunities for tampering.

Bigger than most will say

The hardware and firmware risk is bigger than is generally acknowledged, as announcing breaches has wide-ranging implications for those affected, and so many events are managed discreetly. Those of you who work in defense, intelligence or insurance will know how deep the problem is.

Discover Secure Provenance

SoftIron leads private cloud providers in secure provenance, ensuring unmatched transparency and integrity in their manufacturing process
SoftIron advocates for trustless security in cloud on-premises solutions, emphasizing validation over trust for transparent, verifiable data protection
Discover the importance of hardware security and supply chain integrity through our detailed overview of cybersecurity threats and protective strategies
Back to Top