Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Supply Chain Security

The security of Intel’s supply chain is of the utmost importance to Intel, our customers and our existing suppliers. Intel maintains the same policies and procedures, with appropriate localization to meet laws, regulations, and local risks, for all aspects of the supply chain, independent of the physical location. Intel supports appropriate global standards, when available, that are used to establish policies for security and privacy aspects of Intel’s supply chain.

  • Security Polices
  • Skill Requirements
  • Self-Assessment
  • Security Skill Requirements

IT Security Policies

All suppliers providing hardware, developing software, managing systems and/or processing data on behalf of Intel must meet the minimum requirements outlined in the Intel Information Security Addendum (ISA), and as applicable in the ISA Appendix A for Cloud Security or the ISA Appendix B for Offshore Development Centers. Intel suppliers are subject to Intel’s data protection and cyber security requirements and all applicable laws, including all applicable data protection and cybersecurity laws and regulations. For suppliers within this scope, the following may also apply:

  • Intel, as part of onboarding new suppliers and periodically throughout the agreement, may perform a due diligence risk assessment of a Supplier’s cyber security controls regardless of location, using a combination of internal and industry methods. Supplier will provide reasonable cooperation to Intel by responding to these assessments and attesting to their security controls. Please work with your Intel Account contact to learn more.

Intel Information Security Addendum (ISA)

ISA Appendix A for Cloud Security

ISA Appendix B for Offshore Development Centers

 

Skill Requirements

To drive improvements product security quality, suppliers are expected to source workers who meet a specified set of security skill requirements.  These skill requirements are role-based and apply to all new contracts.

The applicable roles and associated security skill requirements are available for download here; this list may grow over time to comprehend additional roles.  The last column in this table provides links to recommended publicly available training courses to help suppliers remediate security skill gaps.

An optional skill assessment tool (quiz) is available, to make it easier for suppliers to identify security skill gaps.  There are two versions of the quiz:

  • Version to provide to job candidates is available for download here
  • Version (with the answers) to assist the supplier in administering the quiz, identifying skill gaps and the remediation plan, is available for download here

It is anticipated that remediation of identified security skill gaps could potentially require several hours of training if the recommended publicly available courses are used.  Remediation must be completed no later than the first week after a worker’s assignment to Intel.

Self-Assessment Questionnaire

The Self-Assessment Questionnaire (SAQ) is a risk-assessment tool developed by the Responsible Business Alliance (RBA, formerly known as the EICC), which enables corporations to evaluate specific supply chain risk areas including, labor, health and safety, environment, and ethics.

Intel Self-Assessment Questionnaire Summary

Security Skill Requirements

To drive improvements product security quality, suppliers are expected to source workers who meet a specified set of security skill requirements.  These skill requirements are role-based and apply to all new contracts.

The applicable roles and associated security skill requirements are available for download here; this list may grow over time to comprehend additional roles.  The last column in this table provides links to recommended publicly available training courses to help suppliers remediate security skill gaps.

An optional skill assessment tool (quiz) is available, to make it easier for suppliers to identify security skill gaps.  There are two versions of the quiz:

  • Version to provide to job candidates is available for download here
  • Version (with the answers) to assist the supplier in administering the quiz, identifying skill gaps and the remediation plan, is available for download here

It is anticipated that remediation of identified security skill gaps could potentially require several hours of training if the recommended publicly available courses are used.  Remediation must be completed no later than the first week after a worker’s assignment to Intel.

{"limitDisplayedContent":"showAll","collectionRelationTags":{"relations":{"AND":["etm-8768df6374f34b1493a8664ba6cf25e5"]},"featuredIds":[]},"collectionId":"814471","resultPerPage":0.0,"filters":[{"facetId":"ContentType","type":"ContentType","deprecated":true,"name":"ContentType","position":0}],"coveoRequestHardLimit":"1000","accessDetailsPagePath":"/content/www/us/en/secure/design/internal/access-details.html","collectionGuids":["etm-8768df6374f34b1493a8664ba6cf25e5"],"cardView":true,"ignoreSoftware":true,"sorting":"Newest","defaultImagesPath":"/content/dam/www/public/us/en/images/uatable/default-icons","coveoMaxResults":5000,"coveoSplitSize":0,"fpgaFacetRootPaths":"{\"fpgadevicefamily\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Programmable Devices\"],\"quartusedition\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Quartus Software\"],\"quartusaddon\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Quartus Software - Add-ons\"],\"fpgaplatform\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® FPGA Platforms\"]}","newWrapperPageEnabled":true,"descendingSortingForNumericalFacetsName":"[\"Intel® Quartus® Prime Pro Edition\",\"Intel® Quartus® Prime Lite Edition\",\"Intel® Quartus® Prime Standard Edition\",\"Quartus® II Subscription Edition\",\"Quartus® II Web Edition\"]","columnsConfiguration":{"idColumn":false,"dateColumn":false,"versionColumn":false,"contentTypeColumn":false,"columnsMaxSize":0},"dynamicColumnsConfiguration":[{"name":"DynamicColumn_id","type":"id","gtv":"ID","width":60,"selected":true},{"name":"DynamicColumn_date","type":"date","gtv":"Date","width":60,"selected":true},{"name":"DynamicColumn_version","type":"version","gtv":"Version","width":135,"selected":true}],"updateCollateralMetadataEnabled":true,"relatedAssetsEnable":true,"disableExpandCollapseAll":false,"enableRelatedAssetsOnExpandAll":false,"disableBlueBanner":true,"isICS":false,"isUPE":false}
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo