NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION

SA-18Tamper Resistance and Detection

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

For systems that require high assurance, implement tamper resistance (making tampering difficult) and tamper detection (detecting when tampering has occurred). This applies to both hardware and software.

Example 1: Deploy hardware security modules (HSMs) for cryptographic key storage. HSMs are designed with tamper-resistant enclosures that destroy the keys if physical tampering is detected. This protects your most sensitive cryptographic material even if an attacker gains physical access.

Example 2: Implement file integrity monitoring (FIM) using tools like OSSEC, Tripwire, or Microsoft Defender for Endpoint to detect unauthorized changes to critical system files, configuration files, and application binaries. When a change is detected outside of an approved change window, generate an immediate alert.