ISO/IEC 20243-1:2023
(Main)Information technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
Information technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
ISO/IEC 20243-1:2018 (O-TTPS) is a set of guidelines, requirements, and recommendations that address specific threats to the integrity of hardware and software COTS ICT products throughout the product life cycle. This release of the Standard addresses threats related to maliciously tainted and counterfeit products. The provider's product life cycle includes the work it does designing and developing products, as well as the supply chain aspects of that life cycle, collectively extending through the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal. While this Standard cannot fully address threats that originate wholly outside any span of control of the provider ? for example, a counterfeiter producing a fake printed circuit board assembly that has no original linkage to the Original Equipment Manufacturer (OEM) ? the practices detailed in the Standard will provide some level of mitigation. An example of such a practice would be the use of security labeling techniques in legitimate products.
Technologies de l'information — Norme de fournisseur de technologie de confiance ouverte (O-TTPS) — Partie 1: Exigences et recommandations pour l'atténuation des produits contrefaits et malicieusement contaminés
General Information
Relations
Overview
ISO/IEC 20243-1:2023 - the Open Trusted Technology Provider™ Standard (O‑TTPS, Part 1) is an international standard that defines requirements and recommendations to mitigate risks from maliciously tainted and counterfeit Commercial Off‑The‑Shelf (COTS) ICT products. The standard covers practices across the entire product lifecycle - design, sourcing, build, fulfillment, distribution, sustainment, and disposal - and is intended to raise the bar for product integrity and supply chain security.
Key topics and technical requirements
- Lifecycle coverage: Guidelines apply from product engineering through disposal, emphasizing continuous risk management for hardware and software components.
- Threat focus: Addresses two primary risks - maliciously tainted products (authorized channels but tampered) and counterfeit products (unauthorized or fake items).
- Technology development controls: Product development and secure engineering methods (PD and SE attributes) to harden design and development practices.
- Supply chain security: Supply Chain (SC) methods to secure sourcing, supplier selection, logistics, and fulfillment processes against insertion of tainted or counterfeit components.
- Attributes and mandatory requirements: The 2023 second edition refines attribute definitions (including “component” and “security‑critical”) and moves several controls to mandatory status to improve clarity and enforceability.
- Conformance and assessment: Part 1 defines requirements; accompanying Part 2 (Assessment Procedures) can be used to demonstrate conformance and support certification or supplier assurance programs.
Practical applications
- Procurement and supplier risk management: Use O‑TTPS to define procurement language, supplier requirements, and acceptance criteria that reduce the likelihood of acquiring tainted or counterfeit products.
- Secure development lifecycle (SDLC): Integrate PD/SE practices from the standard to strengthen secure engineering and quality assurance.
- Supply chain hardening: Implement SC controls for vendor accreditation, traceability, labeling, and distribution integrity.
- Certification and assurance: Organizations seeking to demonstrate adherence to best practices can follow O‑TTPS requirements and related assessment procedures for third‑party validation.
- Policy and compliance: Governments, defense contractors, and critical infrastructure operators can adopt O‑TTPS to inform procurement policies and regulatory guidance.
Who should use this standard
- COTS ICT providers, OEMs, and software vendors
- Suppliers, contract manufacturers, and integrators
- Acquirers, procurement officers, and risk managers
- Government agencies and critical infrastructure operators seeking supply chain assurance
Related standards and resources
- ISO/IEC 20243 series (other parts as published)
- O‑TTPF (Open Trusted Technology Provider Framework) - companion guidance and best practices
- ISO/IEC 20243‑2 (Assessment Procedures) - for demonstrating conformance
Keywords: ISO/IEC 20243-1:2023, O‑TTPS, Open Trusted Technology Provider Standard, tainted products, counterfeit products, COTS ICT, supply chain security, product lifecycle, secure development.
Frequently Asked Questions
ISO/IEC 20243-1:2023 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products". This standard covers: ISO/IEC 20243-1:2018 (O-TTPS) is a set of guidelines, requirements, and recommendations that address specific threats to the integrity of hardware and software COTS ICT products throughout the product life cycle. This release of the Standard addresses threats related to maliciously tainted and counterfeit products. The provider's product life cycle includes the work it does designing and developing products, as well as the supply chain aspects of that life cycle, collectively extending through the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal. While this Standard cannot fully address threats that originate wholly outside any span of control of the provider ? for example, a counterfeiter producing a fake printed circuit board assembly that has no original linkage to the Original Equipment Manufacturer (OEM) ? the practices detailed in the Standard will provide some level of mitigation. An example of such a practice would be the use of security labeling techniques in legitimate products.
ISO/IEC 20243-1:2018 (O-TTPS) is a set of guidelines, requirements, and recommendations that address specific threats to the integrity of hardware and software COTS ICT products throughout the product life cycle. This release of the Standard addresses threats related to maliciously tainted and counterfeit products. The provider's product life cycle includes the work it does designing and developing products, as well as the supply chain aspects of that life cycle, collectively extending through the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal. While this Standard cannot fully address threats that originate wholly outside any span of control of the provider ? for example, a counterfeiter producing a fake printed circuit board assembly that has no original linkage to the Original Equipment Manufacturer (OEM) ? the practices detailed in the Standard will provide some level of mitigation. An example of such a practice would be the use of security labeling techniques in legitimate products.
ISO/IEC 20243-1:2023 is classified under the following ICS (International Classification for Standards) categories: 13.310 - Protection against crime; 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 20243-1:2023 has the following relationships with other standards: It is inter standard links to ISO/IEC 20243-1:2018. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 20243-1:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 20243-1
Second edition
2023-11
Information technology — Open
TM
Trusted Technology Provider
Standard (O-TTPS) —
Part 1:
Requirements and recommendations
for mitigating maliciously tainted and
counterfeit products
Reference number
© ISO/IEC 2023
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2023 – All rights reserved
Contents Page
Foreword . iv
Preface . vi
Trademarks . viii
Introduction . ix
1 Scope . 1
1.1 Conformance . 2
1.2 Future Directions . 2
2 Normative references . 2
3 Terms and definitions . 2
4 Business Context and Overview. 9
4.1 Business Environment Summary . 9
4.1.1 Operational Scenario . 9
4.2 Business Rationale . 11
4.2.1 Business Drivers . 11
4.2.2 Objectives and Benefits . 12
4.3 Recognizing the COTS ICT Context . 13
4.4 Overview . 14
4.4.1 O-TTPF Overview . 14
4.4.2 O-TTPS Overview . 15
4.4.3 Relationship with Other Standards . 15
5 O-TTPS – Tainted and Counterfeit Risks . 16
6 O-TTPS – Requirements for Addressing the Risks of Tainted and Counterfeit Products . 17
6.1 Technology Development . 18
6.1.1 PD: Product Development/Engineering Method . 19
6.1.2 SE: Secure Development/Engineering Method . 21
6.2 Supply Chain Security . 24
6.2.1 SC: Supply Chain Security Method . 24
Bibliography . 31
© ISO/IEC 2023 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed
for the different types of document should be noted (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had
not received notice of (a) patent(s) which may be required to implement this document. However,
implementers are cautioned that this may not represent the latest information, which may be obtained
from the patent database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall
not be held responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by The Open Group [as Open Trusted Technology Provider Standard
(O-TTPS) V1.2, Part 1: Requirements and Recommendations] and drafted in accordance with its editorial
rules. It was adopted, under the JTC 1 PAS procedure, by Joint Technical Committee ISO/IEC JTC 1,
Information technology.
This second edition cancels and replaces the first edition (ISO/IEC 20243-1:2018), which has been
technically revised.
The main changes are as follows:
— Wording was changed throughout the document, including in beginning materials, attribute
definitions and requirements, as necessary to improve clarity and/or concision.
— The definition of “component” has been clarified to include both hardware and software.
— A definition for “security-critical” has been added.
— PD_DES.01 has become a mandatory requirement.
— PD_CFM.04 has become a mandatory requirement.
— The attribute definition of PD_QAT has been clarified.
— The attribute definition of PD_PSM has been clarified.
iv © ISO/IEC 2023 – All rights reserved
— The SE_VAR requirements have been largely reworked and reorganized, with a new mandatory
requirement being added and several existing requirements becoming mandatory.
— SE_PPR.02 has become a mandatory requirement.
— SE_PPR.04 has become a mandatory requirement.
— SC_RSM.05 has become a mandatory requirement.
— SC_ACC.04 has become a mandatory requirement.
— SC_ESS.02 has become a mandatory requirement.
— SC_ESS.03 has become a mandatory requirement.
— SC_ESS.04 has been completely rewritten and has become a mandatory requirement.
— SC_BPS.02 has become a mandatory requirement.
— The SE_STH requirements have been largely reworked and reorganized, with a new requirement
being added and an existing requirement becoming mandatory.
— SC_CTM.02 has been heavily revised and has become a mandatory requirement.
— SC_MAL.02 has been heavily revised and has become a mandatory requirement
A list of all parts in the ISO/IEC 20243 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
© ISO/IEC 2023 – All rights reserved v
Preface
The Open Group
The Open Group is a global consortium that enables the achievement of business objectives through
technology standards. With more than 870 member organizations, we have a diverse membership that
spans all sectors of the technology community – customers, systems and solutions suppliers, tool
vendors, integrators and consultants, as well as academics and researchers.
The mission of The Open Group is to drive the creation of Boundaryless Information Flow™ achieved by:
— Working with customers to capture, understand, and address current and emerging requirements,
establish policies, and share best practices
— Working with suppliers, consortia, and standards bodies to develop consensus and facilitate
interoperability, to evolve and integrate specifications and open source technologies
— Offering a comprehensive set of services to enhance the operational efficiency of consortia
— Developing and operating the industry’s premier certification service and encouraging procurement
of certified products
Further information on The Open Group is available at www.opengroup.org.
The Open Group publishes a wide range of technical documentation, most of which is focused on
development of Standards and Guides, but which also includes white papers, technical studies,
certification and testing documentation, and business titles. Full details and a catalog are available at
www.opengroup.org/library.
This Document
The Open Group Open Trusted Technology Forum (OTTF) is a global initiative that invites industry,
government, and other interested participants to work together to evolve the O-TTPS and other OTTF
deliverables.
This document is Part 1 of the Open Trusted Technology Provider Standard (O-TTPS). It has been
developed by the OTTF and approved by The Open Group, through The Open Group Company Review
process. There are two distinct elements that should be understood with respect to this document: the
O-TTPF (Framework) and the O-TTPS (Standard).
The O-TTPF (Framework): The O-TTPF is an evolving compendium of organizational guidelines and
best practices relating to the integrity of Commercial Off-The-Shelf (COTS) Information and
Communications Technology (ICT) products and the security of the supply chain throughout the entire
product lifecycle.
An early version of the O-TTPF was published as a White Paper in February 2011, revised in November
2015, and has since been updated and published as a Guide in September 2021. The O-TTPF serves as the
basis for the O-TTPS, future updates, and additional standards. The content of the O-TTPF is the result of
industry collaboration and research as to those commonly used commercially reasonable practices that
increase product integrity and supply chain security. The members of the OTTF will continue to
collaborate with industry and governments and update the O-TTPF as the threat landscape changes and
industry practices evolve.
vi © ISO/IEC 2023 – All rights reserved
The O-TTPS (Standard): The O-TTPS is an open standard containing a set of guidelines that when
properly adhered to have been shown to enhance the security of the global supply chain and the integrity
of COTS ICT products. Part 1 of the O-TTPS (this document) provides a set of guidelines, requirements,
and recommendations that help assure against maliciously tainted and counterfeit products throughout
the COTS ICT product lifecycle encompassing the following phases: design, sourcing, build, fulfillment,
distribution, sustainment, and disposal.
The O-TTPS, Part 2: Assessment Procedures for the O-TTPS provides assessment procedures that may be
used to demonstrate conformance with the requirements provided in Clause 6 of this document.
Using the guidelines documented in the O-TTPF as a basis, the OTTF is taking a phased approach and
staging O-TTPS releases over time. This staging will consist of standards that focus on mitigating specific
COTS ICT risks from emerging threats. As threats change or market needs evolve, the OTTF intends to
update the O-TTPS by releasing addenda to address specific threats or market needs.
The O-TTPS is aimed at enhancing the integrity of COTS ICT products and helping customers to manage
sourcing risk. The authors recognize the value that it can bring to governments and commercial
customers worldwide, particularly those who adopt procurement and sourcing strategies that reward
those vendors who follow the O-TTPS best practice requirements and recommendations.
NOTE Any reference to “providers” is intended to refer to COTS ICT providers. The use of the word “component”
is intended to refer to either hardware or software components.
Intended Audience
The O-TTPS is intended for organizations interested in helping the industry evolve to meet the threats in
the delivery of trustworthy COTS ICT products. It is intended to provide enough context and information
on business drivers to enable its audience to understand the value in adopting the guidelines,
requirements, and recommendations specified within. It also allows providers, suppliers, and integrators
to begin planning how to implement the O-TTPS in their organizations. Additionally, acquirers and
customers can begin recommending the adoption of the O-TTPS to their providers and integrators.
© ISO/IEC 2023 – All rights reserved vii
Trademarks
ArchiMate, DirecNet, Making Standards Work, Open O logo, Open O and Check Certification logo, Platform
3.0, The Open Group, TOGAF, UNIX, UNIXWARE, and the Open Brand X logo are registered trademarks
and Boundaryless Information Flow, Build with Integrity Buy with Confidence, Commercial Aviation
Reference Architecture, Dependability Through Assuredness, Digital Practitioner Body of Knowledge,
DPBoK, EMMM, FACE, the FACE logo, FHIM Profile Builder, the FHIM logo, FPB, Future Airborne
Capability Environment, IT4IT, the IT4IT logo, O-AA, O-DEF, O-HERA, O-PAS, Open Agile Architecture,
Open FAIR, Open Footprint, Open Process Automation, Open Subsurface Data Universe, Open Trusted
Technology Provider, OSDU, Sensor Integration Simplified, SOSA, and the SOSA logo are trademarks of
The Open Group.
All other brands, company, and product names are used for identification purposes only and may be
trademarks that are the sole property of their respective owners.
viii © ISO/IEC 2023 – All rights reserved
Introduction
Part 1 of the O-TTPS is a set of guidelines, requirements, and recommendations that, when practically
applied, create a business benefit in terms of reduced risk of acquiring maliciously tainted or counterfeit
products for the technology acquirer. Documenting best practices that have been taken from the
experience of mature industry providers, rigorously reviewed through a consensus process, and
established as requirements and recommendations in this document, can provide significant advantage
in establishing a basis to reduce risk. A commitment by technology providers, large and small, suppliers
of hardware and software components, and integrators to adopt this document is a commitment to using
specific methodologies to assure the integrity of their hardware or software Commercial Off-The-Shelf
(COTS) Information and Communications Technology (ICT) products. This document is detailed and
prescriptive enough to be useful in raising the bar for all providers and lends itself to the accompanying
certification process that provides assurance that it is being followed in a meaningful and repeatable
manner.
Part 1 of the O-TTPS (this document) is a set of guidelines, requirements, and recommendations that
address specific threats to the integrity of hardware and software COTS ICT products throughout the
product lifecycle. This version of the O-TTPS addresses threats related to maliciously tainted and
counterfeit products.
The provider’s product lifecycle includes the work it does designing and developing products, as well as
the supply chain aspects of that lifecycle, collectively extending through the following phases: design,
sourcing, build, fulfillment, distribution, sustainment, and disposal. While this document cannot fully
address threats that originate wholly outside any span of control of the provider – for example, a
counterfeiter producing a fake printed circuit board assembly that has no original linkage to the Original
Equipment Manufacturer (OEM) – the practices detailed in this document will provide some level of
mitigation. An example of such a practice would be the use of security labeling techniques in legitimate
products.
The two major threats that acquirers face today in their COTS ICT procurements, as addressed in this
document, are defined as:
1. Maliciously tainted product – the product is produced by the provider and is acquired through a
provider’s authorized channel, but it has been tampered with maliciously.
2. Counterfeit product – the product is produced other than by, or for, the provider, or it is supplied to
the provider by other than a provider’s authorized channel and is presented as being legitimate even
though it is not.
NOTE All instances, within this document, of the use of the words: taint, tainted, tainting, refer to malicious taint,
maliciously tainted, and malicious tainting, respectively.
Trusted Technology Providers manage their product lifecycle, including their extended supply chains,
through the application of defined, monitored, and validated best practices. The product’s integrity is
strengthened when providers and suppliers follow the requirements and recommendations specified in
this document. The industry consensus reflected here and in the Open Trusted Technology Provider
Framework (O-TTPF) draws from the following areas that are integral to product integrity: product
development/engineering, secure development/engineering, and supply chain security. Additionally,
product integrity and supply chain security are enhanced by following practices among suppliers, trading
partners, providers, and, when appropriate, acquiring customers to preserve the product’s intended
configuration.
© ISO/IEC 2023 – All rights reserved ix
INTERNATIONAL STANDARD ISO/IEC 20243-1:2023(E)
Information technology — Open Trusted Technology
TM
Provider Standard (O-TTPS) — Mitigating maliciously
tainted and counterfeit products —
Part 1:
Requirements and recommendations
1 Scope
This document is focused on the security of the supply chain versus the business management aspects of
the supply chain. This document takes a comprehensive view about what providers should do in order to
be considered a Trusted Technology Provider that “builds with integrity”. This includes practices that
providers incorporate in their own internal product lifecycle processes, that portion of product
development that is “in-house” and over which they have more direct operational control. Additionally,
it includes the provider’s supply chain security practices that need to be followed when incorporating
third-party hardware or software components, or when depending on external manufacturing and
delivery or supportive services.
The document makes a distinction between provider and supplier. Suppliers are those upstream vendors
who supply components or solutions (software or hardware) to providers or integrators. Providers are
those vendors who supply COTS ICT products directly to the downstream integrator or acquirer.
The guidelines, requirements, and recommendations included in this document should be widely
adopted by providers and their suppliers regardless of size and will provide benefits throughout the
industry.
For this version of the O-TTPS, the following elements are considered out of scope:
— This document does not focus on guidelines, requirements, and recommendations for the acquirer;
the OTTF is considering addressing this area in a separate, complementary publication, such as a
Guide.
In the meantime, an acquirer does have a role to play in assuring that the products and components
they procure are built with integrity. One of the ways that the acquirer can do that is to require their
providers, suppliers, and integrators to be Trusted Technology Providers. Another way is to not
knowingly support the “grey market”, realizing that if an acquirer elects to receive hardware or
software support from grey market suppliers, it is at their own risk and generally outside of the
influence of the legitimate provider.
This document is not meant to be comprehensive as to all practices that a provider should follow
when building software or hardware; for a more comprehensive set of foundational best practices
that a provider could implement to produce good quality products, readers can refer to the O-TTPF
Guide.
© ISO/IEC 2023 – All rights reserved 1
— This version does not apply to the operation or hosting infrastructure of online services, but it can
apply to COTS ICT products in as far as they are utilized by those services.
This document complements existing standards covering product security functionality and product
information assurance, such as ISO/IEC 15408 (Common Criteria).
1.1 Conformance
The Open Group has developed and maintains conformance criteria, assessment procedures, and a
Certification Policy and Program for the O-TTPS as a useful tool for all constituents with an interest in
supply chain security.
The conformance requirements and assessment procedures are available in the O-TTPS, Part 2:
Assessment Procedures for the O-TTPS.
Certification provides formal recognition of conformance to the O-TTPS, which allows:
— Providers and practitioners to make and substantiate clear claims of conformance to the
O-TTPS
— Acquirers to specify and successfully procure from providers who conform to the O-TTPS
1.2 Future Directions
The OTTF intends to address possible additional threats and risks with best practice requirements and
recommendations in a future version.
The OTTF intends to offer additional guidance for different classes of Trusted Technology Providers
seeking certification against this document.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
Shall Indicates an absolute, mandatory requirement that has to be implemented in order to
conform to this document and from which no deviation is permitted. Do not use “must”
as an alternative for “shall”. (This will avoid any confusion between the requirements of
a document and external statutory obligations.)
Shall not Indicates an absolute preclusion, and if implemented would represent a non-conformity.
Do not use “may not” instead of “shall not” to express a prohibition.
Should Indicates a recommendation among several possibilities that is particularly suitable,
without mentioning or excluding others, or that a certain course of action is preferred
but not necessarily required.
2 © ISO/IEC 2023 – All rights reserved
Should not Indicates a practice explicitly recommended not to be implemented, or that a certain
possibility or course of action is deprecated but not prohibited. To conform to the O-
TTPS, an acceptable justification must be presented if the requirement is implemented.
May Indicates an optional requirement to be implemented at the discretion of the
practitioner. Do not use “can” instead of “may” in this context.
Can Used for statements of possibility and capability, whether material, physical, or causal.
Throughout this document, the term O-TTPS is used when referring to The Open Trusted Technology
Provider Standard.
3.1
Acquirer
One who procures hardware and software products and services to create solutions that meet their
customers’ requirements.
3.2
Artifact
Something that results from applying a process.
3.3
Asset
Anything you can use that is considered a thing of value (e.g., tool).
3.4
Backdoor
An intentional and undisclosed mechanism (to the customer/user) in a product, service, or facility which
is intended to provide access to assets and artifacts by an unauthorized party.
3.5
Best Practice
Provides a clear description of a set of tried and tested processes, procedures, and guidelines that, when
practically applied to an operation, brings a business advantage.
3.6
Certification Authority
Provides certification and/or testing services, especially those involved with conformance certification
and/or testing.
3.7
Certification Program
A process in which certification of competency or credibility is provided. As used in this document, it is a
process that a supplier goes through to certify that they meet the requirements of the Open Trusted
Technology Provider Standard (O-TTPS).
3.8
Component
Refers to either hardware or software; for hardware, it refers to any physical, cyber-active element, and
for software, it refers to any module or executable within a system or application.
3.9
Component Supplier
Entity that supplies components, typically as business partners to providers.
© ISO/IEC 2023 – All rights reserved 3
3.10
Configuration Management
A formal process which ensures the proper management, control, and tracking of change to product
development and manufacturing assets and artifacts.
3.11
Conformance Assessment
The act of determining the consistency of an implementation to a specification, or the adherence of a
business operation to a best practice or process definition.
3.12
Contractors/System Integrators
Provide services and solutions to customers; typically used on large projects that deal with multiple
providers.
3.13
COTS
Commercial Off-The-Shelf hardware and software.
3.14
Counterfeit Product
A product that is produced other than by, or for, the provider, or is supplied to the provider by other than
a provider’s authorized channel and is presented as being legitimate even though it is not.
3.15
Development Method
System (or Software) Development Life Cycle (SDLC) development-based method. Applicable to both
hardware and software-based products.
3.16
Downstream
Any entity that is further down the supply chain process from the subject; i.e., the acquirer is downstream
from the integrator (see Upstream).
3.17
Engineering Method
Method that is focused on manufacturing or development processes and practices; for products with
significant hardware-based technology components (chips, firmware, systems, etc.).
3.18
Framework
Defines a set of structured processes and templates that facilitates solving a complex problem. As used in
this document, a set of best practices identified by a cross-industry forum which, if used by a technology
vendor, may allow a government or commercial enterprise customer to consider the vendor’s products
as more secure and trusted.
3.19
Grey Market
Distribution channels which, while legal, are unofficial, unauthorized, or unintended by the original
manufacturer.
3.20
ICT
Information and Communications Technology.
4 © ISO/IEC 2023 – All rights reserved
3.21
IEC
International Electrotechnical Commission.
3.22
Integrator
A third-party organization that specializes in combining products from several suppliers to produce
systems for a customer.
3.23
Integrity
The condition of not being marred or violated; unimpaired or uncorrupted condition; original perfect
state; soundness.
Note 1 to entry: This definition is aligned with ISO/IEC 27000:2009.
3.24
ISO
International Organization for Standardization.
3.25
Legitimate Product
The item is produced by the provider and is acquired through a provider’s authorized channel.
3.26
Lifecycle
A progression through a series of differing stages of development. Commonly referred to as System
Development Life Cycle (SDLC). The course of events that brings a new product into existence and follows
its growth into a mature product and into eventual disposal.
3.27
Mitigation
Any action, device, procedure, technique, or any other measure that reduces the vulnerability or risk.
3.28
ODM
Original Design Manufacturer.
3.29
OEM
Original Equipment Manufacturer.
3.30
Open CA
The Open Group IT Architect Certification Program.
3.31
Open Source
Generically, the term “open source” refers to a program in which the source code is available to the
general public for use and/or modification from its original design free-of-charge; i.e., open. Open source
code is typically created as a collaborative effort in which programmers improve upon the code and share
the changes within the community. Open source sprouted in the technological community as a response
to proprietary software owned by corporations.
[SOURCE: Wikipedia]
© ISO/IEC 2023 – All rights reserved 5
3.32
OSS
Open Source Software – software that is developed collaboratively using an open (visible) development
process.
3.33
OTTF
The Open Group Open Trusted Technology Forum. A global standards initiative to provide a collaborative,
open environment for technology companies, customers, government, and supplier organizations to
create and promote guidelines for manufacturing, sourcing, and integrating trusted, secure technologies.
3.34
O-TTPF
Open Trusted Technology Provider Framework. Initially released as a White Paper in February 2011,
revised in November 2015, and updated and published as a Guide in September 2021 (see
Bibliography [5]), it serves as the basis for the work defined here, future updates, and additional
standards. The O-TTPF is a compendium of organizational guidelines and best practices that if
implemented enhance the security and integrity of Commercial Off-The-Shelf (COTS) Information and
Communications Technology (ICT) products throughout the entire product lifecycle, including the supply
chain aspects of that lifecycle. The content of the O-TTPF is the result of industry collaboration and
research as to the contemporary practical.
3.35
O-TTPS
A standard established by consensus within the OTTF and approved through The Open Group Company
Review process that provides a set of organizational commercial requirements that enhance the security
of the global supply chain and the integrity of COTS ICT products. It provides a set of guidelines and best
practice requirements and recommendations that help assure against tainted and counterfeit products
throughout the COTS ICT product lifecycle encompassing the following phases: design, sourcing, build,
fulfillment, distribution, sustainment, and disposal.
3.36
Product Lifecycle Categories
The two major categories of activities in the product lifecycle covered in this document are:
— Category 1: Technology Development – focuses on two major best practice sub-categories: product
development/engineering and secure development/engineering, and is typically under the direct
control of the provider
— Category 2: Supply Chain Security – focuses on best practices with respect to the supply chain
throughout the following product lifecycle phases: design, sourcing, build, fulfillment, distribution,
sustainment, and disposal; here the provider’s best practices control the point of intersection at the
various nodes, and rely on the provider’s influence and contracts with the supplier
3.37
Product Sustainment Management
Product support, release maintenance, and defect management are offered to customers while the
product is generally available.
3.38
Providers
As used in this document, a midstream vendor developing products and managing the supply chain to
provide acquirers and integrators with trustworthy products.
6 © ISO/IEC 2023 – All rights reserved
3.39
PSIRT
Product Security Incident Response Team.
3.40
RBA
Responsible Business Alliance.
3.41
Risk
An event or condition that has a potentially negative impact and the possibility that such an event will
occur and adversely affect an entity’s assets and artifacts, activities, and operations.
3.42
Risk Management
The process concerned with the identification, measurement, control, and mitigation of risk.
3.43
Security-Critical
A business partner that provides or a process that uses a logic-bearing or software component for a
product; encompasses all aspects of security, including physical, cyber, and supply chain security.
3.44
Standards Body
Any organization whose primary activities are developing, coordinating, promulgating, revising,
amending, re-issuing, interpreting, or otherwise producing standards that are intended to address the
needs of some relatively wide base of affected adopters.
3.45
Supplier
An upstream vendor who develops hardware or software components for providers.
3.46
Supply Chain
A set of organizations, people, activities, information, and resources for creating and moving a product or
service (including its sub-elements) from suppliers through to customers. One of the two major
categories in this document is Supply Chain Security.
3.47
Supply Chain Attack (general)
An attempt to disrupt the creation of goods by subverting the hardware, software, or configuration of a
commercial product, prior to customer delivery (e.g., manufacturing, ordering, or distribution) for the
purpose of introducing an exploitable vulnerability.
3.48
Supply Chain Risk Management
The identification, assessment, prioritization, and mitigation of business, technical, and physical risks as
they pertain to the manufacturing process including the use of third-party components and services in
addition to the delivery of the product to the end user.
3.49
Supply Chain Security
The manufacturing and/or development process performs its intended function in an unimpaired
manner, free from deliberate or inadvertent manipulation. Extends the NIST definition [NIST SP 800-12].
© ISO/IEC 2023 – All rights reserved 7
3.50
System Lifecycle
The phases of a system or proposed system that address its existence from inception to retirement.
3.51
Tainted Product
A product that is produced by the provider and is acquired through a provider’s authorized channel but
has been tampered with maliciously.
Note 1 to entry: All instances, within this document, of the use of the words: taint, tainted, tainting refer to malicious
taint, maliciously tainted, and malicious tainting, respectively.
3.52
Technology Provider
See Provider.
3.53
Technology Supply Chain
The manufacturing and/or development process used to produce and deliver hardware or software
technology products and their configuration.
3.54
Technology Supply Chain Attack
An attack that subverts the hardware, software, or configuration of a product, prior to customer delivery,
for the purpose of introducing an exploitable vulnerability.
3.55
Technology-neutral
An approach whereby the decision to use technology required to meet a stated need is free of any bias.
3.56
Threat
The intention and capability of an adversary to undertake actions that would be detrimental through
disruption of processes or subversion of knowledge.
3.57
Trusted Technology Provider
An organization that has been successfully certified as being conformant to the requirements defined in
the Open Trusted Technology Provider Standard (O-TTPS).
3.58
Upstream
Any entity who is further up the supply chain process from the subject; i.e., vendors who supply
component parts or solutions (software or hardware) to providers or integrators (see Downstream).
3.59
VAR
Value-Add Reseller.
3.60
Vendor
Builds products or components (hardware or software).
8 © ISO/IEC 2023 – All rights reserved
3.61
Vendor-neutral
An approach whereby the decision to use a vendor required to meet a stated technology need is free of
any bias.
3.62
Vulnerability
A weakness in the design, implementation, or operation of an asset, artifact, system, or network that can
be exploited.
3.63
Vulnerability Analysis
The process of determining whether a product contains vulnerabilities and categorizing their potential
severity.
4 Business Context and Overview
This clause describes the typical business environment, the business rationale, the context of Commercial
Off-The-Shelf (COTS) Information and Communications Technology (ICT), and an overview of the Open
Trusted Technology Provider Framework (O-TTPF) and the Open Trusted Technology Provider Standard
(O-TTPS).
4.1 Business Environment Summary
Globalization is inherent in the business environment. The rapid pace of globalization has brought both
benefits and risks to customers of COTS ICT products. Globalization is an essential factor in the ability to
build, deliver, and support feature-rich COTS ICT hardware and software, and the economies of scale
resulting from globalization are a significant benefit. In fact, in today’s market COTS ICT products could
not exist without global development – the global production environment is essential to the technology
industry.
As cyber attacks increase in sophistication, stealth, and severity, global governments and larger
enterprises have also begun to take a more comprehensive approach to risk management as it applies to
product integrity and supply chain security. In addition to enhancing information security by improving
security practices across the enterprise, governments and enterprises have begun inquiring about the
practices COTS ICT vendors use to protect the integrity of their products and services as they are
developed and moved through the global supply chain. First, an understanding is needed of the extent of
the global supply chain by looking at an operational scenario.
4.1.1 Operational Scenario
Figure 1: Constituents provides one example of how the various constituents in COTS ICT product supply
chains ideally would interact. These constituents may not always have a role to play in every scenario.
They are all included to provide a more complete picture.
© ISO/IEC 2023 – All rights reserved 9
Customer/Acquirer Integrator Standards Body
Demands certificate as Will seek business partners Will seek ways of achieving
evidence of conformance who meet Trusted Technology market up-take/integrity
to standards Provider requirements of standards
Standards
Business Partners
Process
Alliance
Business Accreditation
Partners Process
Certification/
Component
Provider Accreditation Body
Suppliers
May be hardware, software, Will seek business partners Must be independent &
global, open source – or not who can meet Trusted Technology vendor/technology-neutral
– multiple supplier layers Provider requirements
Figure 1 — Constituents
Table 1: O-TTPS Constituents and their Roles describes the roles of these constituents in this document.
Table 1 — O-TTPS Constituents and their Roles
Constituent Role Played
Customer Synonymous with acquirer.
Acquirer Acquires or procures a product or service from a supplier, provider, or
integrator.
Procures and integrates components, products, and services to create
solutions that meet the customer’s requirements.
Downstream customer or integrator.
System Integrator Provides services and solutions to customers. Typically used on large
projects that deal with multiple providers.
Engages in competitive tendering processes with acquirers.
Has alliances with providers and acquirers.
Deals with the incorporation of technologies that could be component
technologies as sub-assemblies or component technologies incorporated
into assemblies. These assemblies could be hardware assemblies, software
assemblies, or combinations of hardware and software.
10 © ISO/IEC 2023 – All rights reserved
Constituent Role Played
Vendor Synonymous with provider.
Provider Builds products, either entirely in-house, or including software and/or
hardware components from suppliers.
Has alliances with acquirers, integrators, suppliers (for software or
hardware components), and business partners, including distribution
channel partners.
May also utilize open source software components in development of their
products.
May engage in the standards process with standards bodies.
Engages in the certification process with certification bodies.
Requests that their suppliers follow the O-TTPS and have been certified as
Trusted Technology Providers.
Builds products that may be the subject of certification.
Develops products and manages the supply chain to provide acquirers and
integrators with trustworthy products.
Supplier Supplies components typically as a business partner to providers. May be
required to prove that their products meet certain criteria through
certification or through vendor test and documentation procedures.
Has business partnerships with providers.
May also be a provider in its own right.
Standards Body Develops technical specifications that establish some of the criteria for
certification.
Engages in the standards process with providers, customers, and
integrators.
Has alliances with certification bodies.
Certification Body Provides certification and/or testing services, especially those involved
with conformance certification and/or testing.
Has alliances with standards bodies.
Engages in the certification process with vendors.
4.2 Business Rationale
The following clauses provide the business rationale for the O-TTPS by presenting the business drivers
and
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...