SR-11(1): Anti-counterfeit Training
SR-11(1): Anti-counterfeit training requirement means you must train the personnel who buy, receive, build, deploy, service, or approve system components to recognize and escalate signs of counterfeit hardware, software, and firmware. Operationalize it by defining in-scope roles, delivering role-based training on counterfeit indicators and reporting steps, and retaining completion and effectiveness evidence. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Key takeaways:
- Scope the training to the people touching the component lifecycle, not just general security awareness. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Teach “detect + report”: indicators of counterfeit components and the exact escalation path. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Build audit-ready evidence: roster, materials, completion records, exceptions, and follow-up actions. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Counterfeit components show up in places compliance teams don’t control day-to-day: procurement channels, third-party integrators, secondary markets, returns, repair depots, and “urgent” replacement buys. SR-11(1): anti-counterfeit training requirement is the control enhancement that forces this risk into operations by making detection a trained skill, not an assumption.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat SR-11(1) as a targeted, role-based training obligation tied to the component lifecycle. Your goal is not to turn staff into forensic engineers. Your goal is consistent front-line detection, correct quarantine behavior, and reliable escalation so suspect parts do not get introduced (or remain) in production environments.
This page gives you requirement-level implementation guidance you can execute immediately: who must be trained, what content must be covered, how to run the program through onboarding and refresh cycles, what evidence to retain for assessors, and the exam questions that commonly stall teams. The regulatory hook is straightforward: train designated personnel to detect counterfeit system components, including hardware, software, and firmware. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Regulatory text
Requirement (verbatim): “Train {{ insert: param, sr-11.01_odp }} to detect counterfeit system components (including hardware, software, and firmware).” (NIST SP 800-53 Rev. 5 OSCAL JSON)
What the operator must do
You must:
- Identify the personnel (the “organization-defined personnel” concept) who are in a position to detect counterfeit components across hardware, software, and firmware. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Provide training that enables those personnel to detect counterfeit indicators and respond according to your process. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Maintain evidence that training occurred and is sustained as an operational control, not a one-time campaign. (NIST SP 800-53 Rev. 5 OSCAL JSON)
NIST SP 800-53 is a framework, so SR-11(1) won’t tell you the exact training length or frequency. Assessors will instead test whether your scoping makes sense, your content matches real tasks, and your evidence shows the control operates. (NIST SP 800-53 Rev. 5)
Plain-English interpretation of the requirement
SR-11(1): anti-counterfeit training requirement expects that anyone who can stop counterfeit components from entering (or persisting in) your environment is trained to:
- Notice red flags (packaging anomalies, provenance gaps, unexpected behavior, integrity failures).
- Take safe first actions (do not install, quarantine, preserve evidence).
- Escalate correctly (who to contact, what to record, how to trigger supplier/third-party follow-up).
If the only people trained are “all employees” through generic security awareness, you will struggle in an assessment. SR-11(1) is about component-handling roles and decisions. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Who it applies to (entity and operational context)
Entity scope
This requirement commonly applies to:
- Federal information systems implementing NIST SP 800-53 controls. (NIST SP 800-53 Rev. 5)
- Contractor systems handling federal data where NIST SP 800-53 is part of contractual or program control baselines. (NIST SP 800-53 Rev. 5)
Operational scope (where counterfeit risk shows up)
Train roles that touch any of these activities:
- Sourcing and procurement: purchasing, vendor/third-party onboarding, approvals for “equivalent parts,” exception handling.
- Receiving and inventory: dock/receiving, asset management, warehousing, kitting, returns processing.
- Build and deploy: IT ops, datacenter staff, endpoint teams, network teams, cloud platform engineering for images and templates.
- Software and firmware lifecycle: release engineering, CI/CD admins, repository managers, package maintainers.
- Repair and service: field service, depot repair, warranty replacements, RMA processing.
- Security and quality functions: SOC/IR, vulnerability management, QA, configuration management.
A practical rule: if someone can accept a component into inventory, install it, approve it, or maintain it, that person is a candidate for SR-11(1) training.
What you actually need to do (step-by-step)
Step 1: Name the control owner and define “in-scope personnel”
- Assign a control owner (often Supply Chain Risk Management, Security GRC, or IT Asset/Procurement leadership).
- Define organization-defined personnel in a short scoping memo: list job families, teams, and third-party roles if they operate inside your process. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Deliverable: SR-11(1) scoping statement + role roster.
Step 2: Map training content to the component lifecycle
Build training modules aligned to what people actually do. Keep it operational.
Minimum content topics to cover (mapped to SR-11(1)):
- What “counterfeit” means in your environment: unauthorized clones, tampered parts, substituted components, unauthorized firmware, modified binaries.
- Detection cues by domain:
- Hardware: packaging/label anomalies, serial mismatch, poor workmanship, unexpected sourcing, inconsistent documentation.
- Software: unsigned or unexpectedly signed artifacts, unknown publishers, altered hashes, repository anomalies, dependency confusion cues.
- Firmware: unexpected versioning, integrity check failures, anomalous behavior after update, unapproved update paths.
- Required response actions: stop work, quarantine, preserve packaging/logs, document provenance details, escalate through defined channel.
- Your approved sources and acceptance checks: “buy only through approved channels” is not training unless you teach how to verify and what to do when pressure hits.
- Reporting mechanics: ticket category, required fields, who gets notified (Security, Procurement, Supplier Management), when to trigger incident response.
Deliverable: Training outline mapped to roles (a simple matrix works).
Step 3: Make training role-based (not one-size-fits-all)
Use a role-to-module matrix:
| Role group | What they must be able to detect | What they must do |
|---|---|---|
| Procurement / sourcing | suspect suppliers, provenance gaps, unauthorized substitutions | block purchase, trigger supplier review |
| Receiving / inventory | packaging, labeling, serial/document mismatch | quarantine, record details, notify asset/security |
| IT ops / installers | abnormal behavior, integrity failures | stop install, isolate device, open security ticket |
| DevOps / release | package/repo anomalies, signing/integrity issues | halt pipeline, revoke/rebuild, notify security |
| Repair / field service | swapped parts, abnormal replacement flows | quarantine return, preserve chain-of-custody |
Assessors want to see that training fits responsibilities. SR-11(1) explicitly points to “organization-defined personnel,” which implies scoping decisions. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Step 4: Embed training into onboarding and change points
Counterfeit exposure increases during:
- emergency procurements,
- supplier changes,
- new depot/repair partners,
- new build standards or golden images.
Trigger training at onboarding and when roles change. If you can’t implement automated triggers yet, implement a manual process owned by HR/IT provisioning plus the control owner.
Step 5: Add a simple “suspect component” runbook and test it
Training without a usable runbook fails in practice. Create a one-page runbook:
- quarantine steps,
- do-not-do list (do not power on if unsafe, do not wipe evidence, do not return to supplier without security approval),
- escalation contacts,
- required data fields (supplier, PO, lot/serial, photos, hashes, where installed).
Run a tabletop with procurement + receiving + security to confirm the path works.
Step 6: Operationalize evidence collection (audit-ready by design)
You need evidence that:
- the right people were trained,
- training content covered detection and response,
- training is current,
- issues discovered lead to action.
Daydream (or any GRC system) fits naturally here as the system of record for: the scoped roster, training assignments, completion evidence, exceptions, and follow-up tasks tied to procurement and asset workflows.
Required evidence and artifacts to retain
Keep artifacts in a single control folder with a clear naming convention.
Core evidence set:
- SR-11(1) control narrative (how training is scoped, delivered, tracked). (NIST SP 800-53 Rev. 5)
- Role scoping roster (teams/job codes; include third parties operating your receiving/repair processes where applicable).
- Training materials (slides, videos, job aids, runbook, quick reference).
- Training assignment records (who was assigned what).
- Completion records (LMS exports, attestations for live sessions).
- Exceptions and compensating actions (waivers, delayed completions, interim controls).
- Effectiveness signals (tabletop notes, post-training knowledge checks, records of reported suspect components and dispositions where appropriate).
If you can only keep one extra artifact beyond completion logs, keep the role-to-module mapping. It answers the “why these people” question quickly.
Common exam/audit questions and hangups
Expect these questions in assessments aligned to NIST SP 800-53:
- “Who are the organization-defined personnel?” Provide the scoping memo and roster. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- “Show training content that teaches detection.” Generic ethics or security awareness won’t satisfy SR-11(1). (NIST SP 800-53 Rev. 5 OSCAL JSON)
- “How do you know training is operational?” Show onboarding triggers, refresh approach, and evidence collection. (NIST SP 800-53 Rev. 5)
- “What happens when someone suspects a counterfeit component?” Provide the runbook and examples of escalations/tickets (sanitized if needed).
- “Do third parties in your process get trained?” If a third party receives, repairs, or installs on your behalf, address it contractually and operationally.
Frequent implementation mistakes and how to avoid them
-
Mistake: Training only the security team.
Fix: Scope by lifecycle touchpoints (procurement, receiving, installers, release engineering). SR-11(1) is explicit about training personnel positioned to detect counterfeits. (NIST SP 800-53 Rev. 5 OSCAL JSON) -
Mistake: Generic “supply chain” training with no detection behaviors.
Fix: Add concrete indicators and a quarantine/escalation path for hardware, software, and firmware. (NIST SP 800-53 Rev. 5 OSCAL JSON) -
Mistake: No tie-in to your acceptance process.
Fix: Teach what checks occur at receiving, imaging, code signing, firmware updates, and how staff validate them. -
Mistake: Evidence scattered across procurement, HR, and security.
Fix: Define a single evidence owner and a single system of record (Daydream works well) for roster, materials, completions, and exceptions. -
Mistake: Training exists, but no one knows how to report.
Fix: Publish a short runbook and test it with a tabletop. Keep the output as evidence.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific enforcement actions.
Risk-wise, SR-11(1) reduces the chance that counterfeit components enter production unnoticed. The control also reduces audit risk: assessors routinely treat missing training evidence as a straightforward control failure, especially when supply chain controls exist on paper but do not show operational uptake. (NIST SP 800-53 Rev. 5)
A practical 30/60/90-day execution plan
First 30 days: Stand up the control and stop obvious gaps
- Assign control owner and draft SR-11(1) control narrative. (NIST SP 800-53 Rev. 5)
- Define organization-defined personnel and build a first-pass roster by role. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Write the suspect-component runbook (one page) and publish it in the operating playbooks.
- Collect or create training materials for the highest-risk roles (procurement, receiving, IT install).
Next 60 days: Deliver training and make evidence easy
- Launch role-based training assignments; track completion in your LMS or Daydream.
- Add training to onboarding checklists for in-scope job families.
- Create an exceptions workflow (who approves, how you mitigate until trained).
- Run a tabletop exercise using a counterfeit scenario; capture minutes and action items.
By 90 days: Prove operational effectiveness
- Expand training to software/firmware paths (release engineering, repository admins, platform teams).
- Integrate escalation into ticketing (pre-filled fields for supplier, PO, serial, hashes).
- Review early signals: number and quality of reports, time-to-triage, process friction.
- Package an assessor-ready evidence bundle: narrative, roster, materials, completion exports, tabletop record.
Frequently Asked Questions
Who exactly needs to be trained for SR-11(1)?
Train the people you designate as “organization-defined personnel” who can detect counterfeit components during sourcing, receiving, installation, deployment, servicing, or software/firmware release work. Your scoping decision must be documented and defensible. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Does annual security awareness training satisfy sr-11(1): anti-counterfeit training requirement?
Usually not by itself. SR-11(1) expects training that enables detection of counterfeit hardware, software, and firmware and teaches the correct escalation actions for the roles that handle components. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Do we need separate training for hardware, software, and firmware?
You need coverage for all three domains, but it can be delivered as role-based modules. For example, receiving teams need deeper hardware indicators, while DevOps teams need software supply chain and signing/integrity indicators. (NIST SP 800-53 Rev. 5 OSCAL JSON)
How do we handle third parties who receive or repair equipment on our behalf?
Treat them as part of the operational context: require training or equivalent competence contractually, and retain evidence (attestations, training logs, or agreed procedures). Your program still needs to show that personnel in the process can detect and escalate counterfeit indicators. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence is most likely to be requested in an audit?
Auditors typically ask for the defined in-scope personnel list, training content, completion records, and proof that the reporting path works (runbook plus an exercise or ticket examples). Keep these artifacts together under the SR-11(1) control. (NIST SP 800-53 Rev. 5)
What if we can’t prove whether a component is counterfeit?
SR-11(1) is about detection and escalation, not definitive forensic proof. Train staff to identify anomalies, quarantine safely, preserve evidence, and route the case to security/procurement for validation and supplier engagement. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Frequently Asked Questions
Who exactly needs to be trained for SR-11(1)?
Train the people you designate as “organization-defined personnel” who can detect counterfeit components during sourcing, receiving, installation, deployment, servicing, or software/firmware release work. Your scoping decision must be documented and defensible. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Does annual security awareness training satisfy sr-11(1): anti-counterfeit training requirement?
Usually not by itself. SR-11(1) expects training that enables detection of counterfeit hardware, software, and firmware and teaches the correct escalation actions for the roles that handle components. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Do we need separate training for hardware, software, and firmware?
You need coverage for all three domains, but it can be delivered as role-based modules. For example, receiving teams need deeper hardware indicators, while DevOps teams need software supply chain and signing/integrity indicators. (NIST SP 800-53 Rev. 5 OSCAL JSON)
How do we handle third parties who receive or repair equipment on our behalf?
Treat them as part of the operational context: require training or equivalent competence contractually, and retain evidence (attestations, training logs, or agreed procedures). Your program still needs to show that personnel in the process can detect and escalate counterfeit indicators. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence is most likely to be requested in an audit?
Auditors typically ask for the defined in-scope personnel list, training content, completion records, and proof that the reporting path works (runbook plus an exercise or ticket examples). Keep these artifacts together under the SR-11(1) control. (NIST SP 800-53 Rev. 5)
What if we can’t prove whether a component is counterfeit?
SR-11(1) is about detection and escalation, not definitive forensic proof. Train staff to identify anomalies, quarantine safely, preserve evidence, and route the case to security/procurement for validation and supplier engagement. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream