NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-18 — Tamper Resistance and Detection
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
For systems that require high assurance, implement tamper resistance (making tampering difficult) and tamper detection (detecting when tampering has occurred). This applies to both hardware and software.
Example 1: Deploy hardware security modules (HSMs) for cryptographic key storage. HSMs are designed with tamper-resistant enclosures that destroy the keys if physical tampering is detected. This protects your most sensitive cryptographic material even if an attacker gains physical access.
Example 2: Implement file integrity monitoring (FIM) using tools like OSSEC, Tripwire, or Microsoft Defender for Endpoint to detect unauthorized changes to critical system files, configuration files, and application binaries. When a change is detected outside of an approved change window, generate an immediate alert.