SA-18: Tamper Resistance and Detection
To meet the sa-18: tamper resistance and detection requirement, you must define which system components need tamper resistance, implement physical and logical tamper-evident protections across the supply chain and lifecycle, and prove you can detect, respond to, and document tampering. Operationalize SA-18 by assigning an owner, writing a procedure, and collecting repeatable evidence. 1
Key takeaways:
- Treat SA-18 as an end-to-end control: design, sourcing, receipt, deployment, maintenance, and disposal all matter. 2
- Auditors will ask for evidence you can detect tampering and act on it, not just that you bought “tamper-proof” hardware. 1
- Map SA-18 to a control owner, a written implementation procedure, and recurring evidence artifacts that can be produced on demand. 1
SA-18 sits in the System and Services Acquisition (SA) family and focuses on tamper resistance and tamper detection for system components. Practically, it is a supply chain and lifecycle control: you are expected to reduce the chance that equipment, firmware, software, or supporting components can be altered without authorization, and to detect and respond if it happens. 2
For a CCO, Compliance Officer, or GRC lead, the fastest path to operationalizing SA-18 is to (1) scope which assets and suppliers are in-bounds, (2) set minimum tamper-evidence requirements at purchase and at receipt, (3) implement tamper checks during install and maintenance, and (4) connect detection to incident response and change management so tamper events are handled consistently. 1
This page translates SA-18 into an implementable requirement, with step-by-step actions, concrete artifacts to retain, and the exam questions that commonly derail otherwise solid programs. Where teams struggle most is not the technology; it is repeatable documentation and evidence that spans procurement, IT operations, and physical security. 2
Regulatory text
Excerpt (as provided): “NIST SP 800-53 control SA-18.” 1
What that means for an operator SA-18 requires you to implement tamper resistance and tamper detection controls for system components as part of how you acquire, deploy, and operate systems. The control lives in NIST SP 800-53 Rev. 5 and is assessed as part of your broader control baseline and authorization/assessment activities. 2
Operator obligation in one line: You must be able to show (a) defined requirements for tamper resistance/detection, (b) implementation on in-scope components, and (c) evidence you can detect, investigate, and respond to tampering. 1
Plain-English interpretation (requirement-level)
SA-18 expects you to prevent “silent modification” of technology components and to spot it quickly if it happens. That includes physical tampering (e.g., device casing opened, seals broken, ports accessed) and logical tampering (e.g., unauthorized firmware changes, unexpected component substitution) to the extent it is relevant to your environment and component types. 2
A clean way to interpret SA-18 in a program is:
- Before purchase: specify tamper requirements and supplier obligations.
- At receipt: verify authenticity and tamper-evidence.
- During operations: continuously protect and periodically inspect.
- On suspicion: escalate, preserve evidence, remediate, and document. 2
Who it applies to (entity + operational context)
Entities
- Federal information systems and organizations implementing NIST SP 800-53 controls. 2
- Contractors and other organizations handling federal data or operating systems assessed against NIST SP 800-53 requirements. 2
Operational contexts where SA-18 becomes “real”
- Data centers, network closets, and remote sites where physical access controls vary.
- Endpoints and field devices that leave controlled facilities.
- High-assurance environments where component authenticity and integrity are part of the threat model.
- Third-party sourcing scenarios (resellers, integrators, repair depots) where custody changes hands. 2
What you actually need to do (step-by-step)
1) Assign control ownership and define scope
- Name a control owner (often Security Engineering or IT Operations with Physical Security partnership) and a compliance owner accountable for evidence readiness. 1
- Define “system components” in scope for SA-18 (examples: servers, network gear, endpoints, storage media, HSMs, IoT/OT devices, critical removable media). Keep the scoping memo explicit so auditors do not expand scope during fieldwork. 2
- Document where components live (sites, racks, rooms, vehicles, employee homes) and the custody model (who can touch what, under what approvals). 2
2) Set tamper resistance and detection requirements in procurement
- Update purchase requirements to include tamper expectations appropriate to the component (tamper-evident packaging, sealed enclosures, port blockers, secure boot/firmware integrity features, serialized parts, documented chain of custody). Keep it as a checklist buyers can apply. 2
- Contractually bind third parties that supply, ship, stage, or repair equipment to preserve integrity and report anomalies (e.g., damaged packaging, broken seals, mismatched serials). 2
- Define acceptance criteria: what conditions trigger quarantine, rejection, or investigation at receiving. 2
3) Implement receiving, staging, and deployment controls
- Receiving inspection procedure: verify packaging condition, seals, serial numbers, expected configuration, and shipping documentation. Record results. 2
- Quarantine workflow: if an anomaly exists, isolate the component, restrict access, and open an incident or investigation ticket. Tie the workflow to incident response and asset management. 2
- Baseline integrity at deployment: capture device identity (serial, asset tag), approved firmware/OS version, and configuration state at install. Store baselines in your CMDB and configuration management tools. 2
4) Operate detection and periodic verification
- Physical tamper checks: incorporate inspection into maintenance windows and site walkthroughs (e.g., seals intact, chassis screws not disturbed, port blockers present, rack locks in place). 2
- Logical integrity checks: enable integrity monitoring features that fit your environment (firmware validation, secure boot attestation, signed updates, device inventory reconciliation). Document what you check, how you alert, and who responds. 2
- Inventory reconciliation: periodically reconcile what is installed vs. what is approved, including replacement parts and RMAs, to catch component substitution. 2
5) Connect detection to response, forensics, and lessons learned
- Response runbook: define what happens after tamper suspicion: isolate, preserve logs/photos, restrict access, notify stakeholders, and decide on reimage/replace vs. deeper analysis. 2
- Root cause and corrective actions: feed outcomes into procurement updates, site access control changes, and configuration hardening. 2
- Evidence packaging: ensure every tamper event (even false positives) leaves an audit trail: ticket, findings, decision, remediation, closure approval. 1
Required evidence and artifacts to retain
Auditors typically accept SA-18 when evidence shows design + operating effectiveness. Build an “SA-18 evidence binder” that refreshes naturally through operations.
Core artifacts
- SA-18 control statement with scope, roles, and mapped procedures. 1
- Tamper resistance/detection procedure covering procurement, receiving, deployment, maintenance, and disposal. 2
- Approved component standards (e.g., minimum integrity features for classes of devices). 2
- Receiving inspection records (checklists, photos where appropriate, serial verification logs). 2
- Asset inventory and baselines (CMDB records, configuration baselines, firmware/OS version baselines). 2
- Tamper events and investigations (incident tickets, quarantine logs, forensics notes, remediation approvals). 2
Make evidence repeatable Daydream (or any GRC system) becomes useful when it stores: the control owner, the procedure, and the recurring evidence request list so SA-18 does not depend on one person’s memory. The assessment friction point for SA-18 is usually missing receiving logs and inconsistent baselines across teams. 1
Common exam/audit questions and hangups
| What auditors ask | What they are testing | What to show |
|---|---|---|
| “Which components are in scope for SA-18, and why?” | Scope discipline | Scoping memo, asset classes, boundary diagram references. 2 |
| “How do you detect tampering after deployment?” | Operating effectiveness | Inspection logs, integrity monitoring alerts, and response tickets. 2 |
| “What happens when a shipment arrives with damaged seals?” | Response consistency | Receiving SOP + quarantine workflow + sample ticket with closure evidence. 2 |
| “How do third parties fit into your chain of custody?” | Supply chain control | Contract clauses, RMA/repair processes, custody logs. 2 |
Typical hangup: teams show a physical security policy but no component-level tamper checks, no receiving evidence, and no documented quarantine path. That reads as “intent” rather than “implemented control.” 1
Frequent implementation mistakes (and how to avoid them)
-
Mistake: “Tamper resistant” is treated as a product claim.
Fix: translate it into acceptance criteria and operational checks (what you inspect, what triggers quarantine). 2 -
Mistake: No one owns receiving inspection.
Fix: assign responsibility to a specific function (IT logistics, data center ops, or facilities) and require a logged checklist per receipt for in-scope components. 2 -
Mistake: Integrity checks exist but aren’t tied to response.
Fix: route alerts into the same ticketing and incident workflow used for security events; require documented disposition. 2 -
Mistake: Repair and RMA paths are uncontrolled.
Fix: treat repair depots and integrators as third parties in the custody chain; require verification on return and update baselines. 2
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for SA-18, so this page does not cite specific regulatory actions. 1
Risk-wise, SA-18 failures show up as:
- Inability to prove component integrity after a security incident.
- Increased likelihood of undetected hardware/firmware manipulation in high-risk environments.
- Audit findings for missing evidence of operational checks, even if physical security controls exist. 2
Practical execution plan (30/60/90-day)
Use this as a sequencing guide; adapt to your change windows and procurement cycles.
First 30 days (stabilize scope + write the playbook)
- Assign SA-18 control owner and backup; publish RACI across Security, IT Ops, Physical Security, Procurement. 2
- Define in-scope asset classes and locations; document assumptions. 2
- Draft the receiving inspection SOP, quarantine workflow, and tamper event runbook. 2
- Create an evidence checklist and a single repository location for artifacts (GRC or controlled shared drive). 1
By 60 days (implement controls where the evidence is weakest)
- Roll out receiving inspections for in-scope components; start collecting logs immediately. 2
- Update procurement templates and third-party terms for integrity/tamper reporting where feasible. 2
- Establish baseline capture at deployment (serials, firmware versions, configuration snapshots) and ensure it lands in your inventory system. 2
By 90 days (prove operating effectiveness)
- Run a tabletop: simulate a tamper-indicating event from receipt through investigation and closure; produce the evidence packet. 2
- Implement periodic verification (site checks + inventory reconciliation) and define who reviews results. 2
- Conduct an internal control review in Daydream: confirm owner, procedure, and recurring evidence artifacts are current and assigned. 1
Frequently Asked Questions
Does SA-18 apply only to physical hardware?
No. The intent covers system components broadly, which can include firmware and other elements where tampering could change behavior without authorization. Scope it explicitly and document what is in and out. 2
What is the minimum evidence an auditor will accept for SA-18?
A documented procedure plus proof it runs in practice: receiving inspection records, baselines, and at least one example of a tamper anomaly handled through a ticketed workflow. Keep evidence tied to in-scope components. 1
How do we handle remote employees and home offices?
Treat endpoints outside controlled facilities as higher exposure for physical tampering. Define required endpoint controls, user handling rules, and what triggers replacement or investigation after loss, repair, or suspicious behavior. 2
Do we need tamper-evident seals everywhere?
Not necessarily. Apply tamper resistance and detection proportionate to the component’s criticality and the environment’s access risk, then document the rationale so scope decisions hold up in audit. 2
How should third-party repairs (RMA) be controlled under SA-18?
Track custody, require verification on return (serials, configuration/firmware baselines), and document inspection results before redeployment. Treat repair paths as part of the component lifecycle, not an exception. 2
We have strong facility access controls. Is that enough?
Facility controls help but do not replace component-level tamper detection. Auditors typically expect evidence of receiving checks, baselines, and a defined response path tied to suspected tampering. 2
Footnotes
Frequently Asked Questions
Does SA-18 apply only to physical hardware?
No. The intent covers system components broadly, which can include firmware and other elements where tampering could change behavior without authorization. Scope it explicitly and document what is in and out. (Source: NIST SP 800-53 Rev. 5)
What is the minimum evidence an auditor will accept for SA-18?
A documented procedure plus proof it runs in practice: receiving inspection records, baselines, and at least one example of a tamper anomaly handled through a ticketed workflow. Keep evidence tied to in-scope components. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
How do we handle remote employees and home offices?
Treat endpoints outside controlled facilities as higher exposure for physical tampering. Define required endpoint controls, user handling rules, and what triggers replacement or investigation after loss, repair, or suspicious behavior. (Source: NIST SP 800-53 Rev. 5)
Do we need tamper-evident seals everywhere?
Not necessarily. Apply tamper resistance and detection proportionate to the component’s criticality and the environment’s access risk, then document the rationale so scope decisions hold up in audit. (Source: NIST SP 800-53 Rev. 5)
How should third-party repairs (RMA) be controlled under SA-18?
Track custody, require verification on return (serials, configuration/firmware baselines), and document inspection results before redeployment. Treat repair paths as part of the component lifecycle, not an exception. (Source: NIST SP 800-53 Rev. 5)
We have strong facility access controls. Is that enough?
Facility controls help but do not replace component-level tamper detection. Auditors typically expect evidence of receiving checks, baselines, and a defined response path tied to suspected tampering. (Source: NIST SP 800-53 Rev. 5)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream