Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Sourcing and Manufacturing Security Practices
Introducing 4th Gen Intel® Xeon® Scalable Processors Introducing 4th Gen Intel® Xeon® Scalable Processors
Introducing 4th Gen Intel® Xeon® Scalable Processors

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

Sourcing and Manufacturing Security

How Products are Made Matters

Security is more complex than antivirus or memory protections. Attack surface can include third-party components or the physical alteration of hardware in manufacturing.

Our sourcing and manufacturing practices are built on decades of experience and aligned to industry-leading processes -- many we helped establish.

From suppliers and raw materials, to world-class manufacturing and secure delivery, nobody has more expertise driving secure supply chain and manufacturing practices.


Understanding the Risks

Risks exist throughout the product lifecycle. Each stage can present distinct risks, while some are present throughout. Examples by stage include:

  • Nonconforming parts and materials
  • Responsibly sourced minerals
  • Quality, functional, security issues
  • Process gaps
  • Supplier risk

  • Faulty, inadequate, or misused design tools
  • Architectural and design vulnerabilities
  • Unintended consequences of intentional design changes
  • Compromised or stolen secrets
  • Outsourced supplier risk
  • Outsourced IP tampering

  • Network and system vulnerabilities
  • Unauthorized facility access
  • Business continuity
  • Infrastructure availability
  • Unauthorized changes to machine settings
  • Improper configuration of factory options
  • Incomplete testing
  • Third-party support and maintenance risk

  • Freight theft
  • Tampering
  • False description
  • Product substitution
  • Counterfeiting
  • Third-party provider risk

A Comprehensive Approach to Managing the Risks

Our risk mitigation controls are tailored to today’s security challenges. We apply robust strategies for quality assurance and supply chain security.

  

Design, Sourcing, and Procurement


Risk management across the supply chain guides supplier selection, conformance to industry certifications and standards, and continuous quality management.

  

Manufacture, Assembly, and Test


Statistical monitoring, audits, proprietary algorithms plus unit-level traceability to detect issues and mitigate risks all contribute to improved security throughout the manufacturing process.

  

Distribution and Customer Delivery


Advanced provenance/surveillance technologies help mitigate counterfeiting risk, helping enable the secure storage and transport of our products to customers.

 

  

  

  

  

  

Security Practices Designed with You in Mind

Supply chain and manufacturing creates a fundamental level of security in our products.

Learn about security in design and support, so that no matter what you get from Intel, you can be confident it was developed to deliver optimal security.

Learn more


 

Intel Alignment to Global Standards

A key aspect of our supply chain and manufacturing security is alignment with industry standards. Highlights include:

International Organization for Standardization (ISO)

  • ISO 9001:2015 Certification covering Quality Management Systems
  • ISO 27001 Certification covering Information Security Management
  • ISO 27000 Series covering Information security management systems, controls, and risk management
  • ISO 28000 series covering security management systems for the supply chain

National Institute of Standards and Technology (NIST)

  • Original partner to NIST National Cybersecurity Center of Excellence (NCCOE)
  • NIST 800 Series (53, 161, 171) covering:
  • Security and Privacy Controls for Information Systems and Organizations
  • Supply Chain Risk Management Practices for Federal Information Systems and Organizations
  • Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Transported Asset Protection Association (TAPA)

  • TAPA Facility Security Requirements (FSRs)
  • TAPA Truck Security Requirements (TSRs)

U.S. Customs Trade Partnership Against Terrorism: Tier III Certified

 

Industry influence is one reason that Intel has been a mainstay in the Gartner Supply Chain ranking. Intel is #6 for 2021, marking our tenth straight year in the Top 10!

  

  

  

  

  

  

Compute Lifecycle Assurance: Supply Chain and Beyond

Compute Lifecycle Assurance (CLA) was developed with key initiatives to extend trust throughout the product lifecycle. This includes Transparent Supply Chain, providing visibility from manufacture to deployment. Measurements taken at the factory of origin give IT a simple way to check and validate integrity.

Learn more


 

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo