1.6 – Check Tamper Resistance Features
1.6 – Check Tamper Resistance Features
Requirement Description
Verify the presence of tamper resistance and/or tamper detection features in the DUT, ensuring the device can detect and/or resist unauthorized attempts to modify or interfere with its hardware or software. This includes mechanisms to:
Prevent or detect software tampering (e.g., firmware integrity checks, secure boot).
Prevent or detect hardware tampering (e.g., tamper-evident seals, intrusion detection sensors).
DUT Software Details
Software Name/Version: ___________________
Build Date: ___________________
Build Number: ___________________
Hash Checksum Verification for DUT’s Software Image
Algorithm Used: SHA-256 (or other approved algorithm)
Expected Hash: ___________________
Calculated Hash: ___________________
Result: Pass / Fail
DUT Configuration
(Insert any commands, settings, or features enabled to verify tamper resistance and detection functionality.) Example:
show security tamper-status
show system integrity
Pre-Conditions
The vendor shall provide the following:
Documentation of measures available in the device to prevent software tampering (e.g., code signing, secure boot, runtime integrity monitoring).
Documentation of measures available in the device to prevent hardware tampering (e.g., tamper-evident seals, enclosure sensors, secure enclosures).
Test Plan
Total Number of Test Cases: 2
Planned Test Cases:
BIS-1.6.1 – Verification of software tamper resistance/detection features.
BIS-1.6.2 – Verification of hardware tamper resistance/detection features.
Test-bed Diagram with Interfaces and IPs
(Attach diagram showing DUT, test equipment, tamper detection interface connections, and any monitoring tools used.)
Last updated
Was this helpful?