Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Supply Chain Security Practices

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Supply Chain Security Practices

Driving Security Through the Supply Chain

Intel’s Supply Chain Risk Management (SCRM) program and award-winning supply chain practices provide assurance to customers, complement our product security capabilities, and are a critical component of Compute Lifecycle Assurance.

Intel’s SCRM program is aligned to industry-recognized frameworks such as those published by the U.S. National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO).

Elements of Intel’s SCRM include:

  • Use of top-tier suppliers, OEMs, and authorized distributors
  • Certifications and standards conformance
  • Standardized operating procedures
  • Industry recognized continuous supplier quality management program

Examples of how Intel practices SCRM include the following:

  • After strategically identifying top-tier suppliers, security posture is monitored throughout the supplier lifecycle, from request for information (RFI) and selection, to end of life.
  • Security expectations are established in supplier contracts, reinforced through required trainings and recurring assessments.
  • Critical vendors are required to maintain applicable certifications and attestations such as:
  • ISO 9001:2015, ISO 27001
  • U.S. Customs Trade Partnership Against Terrorism (C-TPAT)
  • Transported Asset Protection Association (TAPA)
  • Our long-standing Supplier Quality Improvement program (EPIC) builds strong supplier relationships, best-in-class performance, and helps ensure security expectations are met through quarterly report cards, Quality Audits and award incentives.
  • Cybersecurity-specific SCRM practices include:
  • On-site and remote Information Security audits by qualified Intel and third-party auditors
  • Continuous monitoring of supplier-provided software applications for security compliance
  • Real-time continuous cybersecurity monitoring through a third-party platform
  • Assessment of supplier business continuity & recovery plans, including cyberattack readiness

More Information

Security Practices Overview

Hardware-Enabled Security

Security Development Lifecycle

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo