docs/quorum-vault-system/src/generated-documents/level-2/fixed-location/procurer/procure-hardware.md

1.7 KiB

Hardware Procurement

Requirements

{{ #include ../../basic-requirements.md:requirements }}

  • Sealable plastic bag is required for this procedure:

    • {{ #include ../../../../component-documents/hardware-models.md:sealable-plastic-bags }}

Procedure: Local Procurement

{{ #include ../../../../component-documents/hardware-procurement-and-chain-of-custody.md:steps}}

Procedure: Online Procurement

  1. Select a well known and reputable supplier. Establishing a relationship with a hardware supplier that has a reputation for privacy, supply chain security is preferred.

  2. Order the supplies to a registered mailbox, to prevent exposing your organization's location

Tamper Proofing

All hardware:

  • MUST be procured using dual custody methods

  • MUST be tamper proofed using vacuum sealing / stored in tamper evident vault

  • MUST be properly labelled

  • MUST be added to cryptographically signed inventory

Procedure

{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}

Equipment Models

Computers Models

For Level 2 security, air-gapped computers which are used for cryptographic material management and operations are required.

{{ #include ../../hardware.md:computer-models }}

SD Cards & Adapters

SD cards can be tamper proofed in packs of 4 to reduce the amount of tamper proofing that needs to be done.

Any high quality SD equipment can be used but below are some recommended products:

{{ #include ../../../../component-documents/hardware-models.md:sd-models }}

Smart Cards

{{ #include ../../../../component-documents/hardware-models.md:smart-cards }}