NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION

SA-19Component Authenticity

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Verify that system components are authentic and not counterfeit. Counterfeit components may contain backdoors, malware, or simply fail when you need them most.

Example 1: Purchase IT equipment only from authorized resellers or directly from manufacturers. Verify component authenticity by checking serial numbers against manufacturer databases before deployment. Report any suspected counterfeits to the manufacturer and appropriate authorities.

Example 2: Implement anti-counterfeit procedures in your procurement process: require certificates of authenticity from vendors, verify firmware versions against manufacturer specifications, and use hardware authentication features (like TPM attestation) to verify component integrity during system boot.