TL;DR
Yes, several standards and guidelines help ensure tamper-evident devices are robust and reliable. These cover physical security, data integrity, and reporting. This guide outlines key options for manufacturers and users.
Standards & Guidelines for Tamper-Evident Devices
- NIST Special Publication 800-190: Application and Operating System Security Guide
- While not *specifically* about tamper evidence, it provides a strong foundation for secure development practices that contribute to it. Focus on sections relating to integrity checking and boot processes.
- FIPS 140-2/140-3 (Federal Information Processing Standards)
- This is a US government standard for cryptographic modules, but relevant levels can apply to tamper detection. Higher levels require physical security measures and tamper response mechanisms. It’s complex and expensive, best suited for high-security applications.
- Consider the level of protection needed: Level 2 requires physical tamper evidence; Level 3 adds tamper response.
- ISO/IEC 19790: Security requirements for cryptographic modules
- An international standard similar to FIPS 140-2, offering a globally recognised framework for security validation of crypto modules. Again, relevant if cryptography is core to the device’s tamper evidence features.
- Common Criteria (ISO/IEC 15408)
- A comprehensive standard for computer security certification. Devices can be evaluated against specific Protection Profiles that include requirements for tamper resistance and detection.
- Payment Card Industry Data Security Standard (PCI DSS)
- If your device handles cardholder data, PCI DSS has requirements relating to physical security of devices and detection of tampering. Specifically, section 9 covers these areas.
- Physical Security Best Practices
- These aren’t formal standards but are crucial:
- Tamper-Resistant Packaging: Use materials that show clear evidence of opening or damage.
- Epoxy/Potting: Encasing sensitive components in epoxy makes physical access difficult.
- Secure Boot: Ensure the device only boots trusted software using cryptographic signatures. Example (simplified Linux):
secureboot --enable - Hardware Security Modules (HSMs): Use dedicated hardware to protect keys and sensitive data.
- Anti-Tamper Sensors: Implement sensors that detect physical intrusion or environmental changes.
- Data Integrity Checks
- Regularly verify the integrity of firmware and critical data using checksums or cryptographic hashes.
- Example (using `sha256sum` on Linux):
sha256sum /path/to/firmware.binCompare this hash against a known good value.
- Logging and Reporting
- Maintain detailed logs of security-related events, including any detected tamper attempts.
- Implement mechanisms to report tampering incidents promptly.
Choosing the Right Approach
The best approach depends on your risk profile and application requirements:
- Low Risk: Physical security best practices and data integrity checks may be sufficient.
- Medium Risk: Consider PCI DSS if applicable, along with more robust physical tamper resistance measures.
- High Risk: FIPS 140-2/140-3 or Common Criteria certification might be necessary.

