NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-34(3)Hardware-based Protection

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Use hardware-based mechanisms to enforce protection of non-modifiable executables — not just software policies that could be bypassed.

Example 1: Use TPM-based measured boot to create a hardware-anchored chain of trust. Each boot component is measured into the TPM before execution. If any component has been modified, the TPM measurements change and the system can refuse to boot or alert the administrator.

Example 2: Deploy systems with hardware write-protect jumpers on BIOS/UEFI flash chips. The firmware cannot be modified by software (even by malware with root access) unless someone physically changes the jumper — requiring physical access to the machine.