Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Initial Access
  4. >ATTACK-T1195.003
ATTACK-T1195.003Active

Compromise Hardware Supply Chain

Statement

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.

Location

Tactic
Initial Access

Technique Details

Identifier
ATTACK-T1195.003
Parent Technique
ATTACK-T1195
ATT&CK Page
View on MITRE

Tactics

Initial Access

Platforms

LinuxmacOSWindows

Detection

Hardware Supply Chain Compromise Detection via Host Status & Boot Integrity Checks

Mitigations

Boot Integrity: Boot Integrity ensures that a system starts securely by verifying the integrity of its boot process, operating system, and associated components. This mitigation focuses on leveraging secure boot mechanisms, hardware-rooted trust, and runtime integrity checks to prevent tampering during the boot sequence. It is designed to thwart adversaries attempting to modify system firmware, bootloaders, or critical OS components. This mitigation can be implemented through the following measures:

Implementation of Secure Boot:

  • Implementation: Enable UEFI Secure Boot on all systems and configure it to allow only signed bootloaders and operating systems.
  • Use Case: An adversary attempts to replace the system’s bootloader with a malicious version to gain persistence. Secure Boot prevents the untrusted bootloader from executing, halting the attack.

Utilization of TPMs:

  • Implementation: Configure systems to use TPM-based attestation for boot integrity, ensuring that any modification to the firmware, bootloader, or OS is detected.
  • Use Case: A compromised firmware component alters the boot sequence. The TPM detects the change and triggers an alert, allowing the organization to respond before further damage.

Enable Bootloader Passwords:

  • Implementation: Protect BIOS/UEFI settings with a strong password and limit physical access to devices.
  • Use Case: An attacker with physical access attempts to disable Secure Boot or modify the boot sequence. The password prevents unauthorized changes.

Runtime Integrity Monitoring:

  • Implementation: Deploy solutions to verify the integrity of critical files and processes after boot.
  • Use Case: A malware infection modifies kernel modules post-boot. Runtime integrity monitoring detects the modification and prevents the malicious module from loading.
SP 800-53
SP800-53-CA-8relatedvia ctid-attack-to-sp800-53
SP800-53-CM-3relatedvia ctid-attack-to-sp800-53
SP800-53-CM-5relatedvia ctid-attack-to-sp800-53
SP800-53-CM-8relatedvia ctid-attack-to-sp800-53
SP800-53-IA-7relatedvia ctid-attack-to-sp800-53
View in graphReport an issue
← Back to Initial Access
Initial Access15 controls
ATTACK-T1189Drive-by CompromiseATTACK-T1190Exploit Public-Facing ApplicationATTACK-T1195Supply Chain CompromiseATTACK-T1195.001Compromise Software Dependencies and Development ToolsATTACK-T1195.002Compromise Software Supply ChainATTACK-T1195.003Compromise Hardware Supply ChainATTACK-T1199Trusted RelationshipATTACK-T1200Hardware AdditionsATTACK-T1566PhishingATTACK-T1566.001Spearphishing AttachmentATTACK-T1566.002Spearphishing LinkATTACK-T1566.003Spearphishing via ServiceATTACK-T1566.004Spearphishing VoiceATTACK-T1659Content InjectionATTACK-T1669Wi-Fi Networks