SR-11 - Component Authenticity

a. Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system; and b. Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations] ; [Assignment: organization-defined personnel or roles] ].


ID: SR-11
Enhancements:  1 | 2 | 3

Space Segment Guidance

Component authenticity emphasizes authorized sourcing, verification of manufacturer markings/lot history, and end-to-end traceability through assembly. For programmable logic, consider bitstream/device-ID binding, anti-rollback, and locked debug interfaces; where supported, use cryptographic device identity. Acceptance tests that stress expected behavior under environmental limits help surface anomalies. For COTS compute/network gear in ground segments, consider secure boot, firmware provenance, and attestation or inventory telemetry that ties deployed items to approved sources and versions.