docs/trove/src/generated-documents/level-2/fixed-location/procurer/procure-hardware.md

56 lines
1.7 KiB
Markdown

# Hardware Procurement
## Requirements
{{ #include ../../basic-requirements.md:requirements }}
* Sealable plastic bag is required for this procedure:
* {{ #include ../../../../component-documents/hardware-models.md:sealable-plastic-bags }}
## Procedure: Local Procurement
{{ #include ../../../../component-documents/hardware-procurement-and-chain-of-custody.md:steps}}
## Procedure: Online Procurement
1. Select a well known and reputable supplier. Establishing a relationship with a hardware supplier that has a reputation for privacy, supply chain security is preferred.
2. Order the supplies to a registered mailbox, to prevent exposing your organization's location
## Tamper Proofing
All hardware:
* MUST be procured using dual custody methods
* MUST be tamper proofed using vacuum sealing / stored in tamper evident vault
* MUST be properly labelled
* MUST be added to cryptographically signed inventory
### Procedure
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
## Equipment Models
### Computers Models
For [Level 2](../../../../threat-model.md#level-2) security, air-gapped computers which are used for cryptographic material management and operations are required.
{{ #include ../../../../hardware.md:computer-models }}
### SD Cards & Adapters
SD cards can be tamper proofed in packs of 4 to reduce the amount of tamper proofing that needs to be done.
Any high quality SD equipment can be used but below are some recommended products:
{{ #include ../../../../component-documents/hardware-models.md:sd-models }}
### Smart Cards
{{ #include ../../../../component-documents/hardware-models.md:smart-cards }}