Administrator Guide

Technical support and resources
ID 483
Connection View validates the location of the server indirectly by reporting details about the switch it is
connected to. The switch identity provides geolocation to assure that the server is not a rogue server in a
nonauthorized site, providing another layer of physical security. Geolocation also provides validation that an
application or VM has not “crossed” country or region borders, and that it is running in an approved, secure
environment.
3.6 Supply Chain Integrity and Security
Supply Chain Integrity focuses on two key challenges:
o Maintaining Hardware Integrity: Ensuring that there is no product tampering or insertion of counterfeit
components before shipping product to customers.
o Maintaining Software Integrity: Ensuring that no malware gets inserted in firmware or device drivers
before shipping product to customers and preventing any coding vulnerabilities.
Dell EMC defines supply chain security as the practice and application of prevention and detection control
measures that protect physical assets, inventory, information, intellectual property, and people. These
security measures provide supply chain assurance and integrity by reducing opportunities for malicious or
negligent introduction of malware and counterfeit components into the supply chain.
3.6.1 Hardware and Software Integrity
Dell EMC is focused on ensuring that quality control processes are in place to help minimize the opportunity
for counterfeit components to infiltrate the supply chain. The controls Dell EMC has in place span supplier
selection, sourcing, production processes, and governance through auditing and testing. The product
introduction process verifies that all materials used during all build stages are sourced from the approved
vendor list and match the bill of materials. Material inspections during production help identify components
that are mismarked, deviate from normal performance parameters, or contain an incorrect electronic identifier.
Parts are procured directly from the Original Design Manufacturer (ODM) or Original Component
Manufacturer (OCM) when possible. The material inspection that occurs during the product introduction
process provides multiple opportunities to identify counterfeit or corrupted components that may have entered
the supply chain.
Dell EMC maintains ISO 9001 certification for all global manufacturing sites. Strict adherence to these
processes and controls helps minimize the risk of counterfeit components being embedded among the Dell
EMC products. This standard also protects against malware getting inserted into firmware or device drivers.
These measures are implemented as part of Software Development Lifecycle (SDL) process.
3.6.2 Physical Security
Dell EMC has several long-standing, key practices that establish and maintain security in manufacturing
facilities and logistical networks. Factories where Dell EMC products are built must meet specified
Transported Asset Protection Association (TAPA) facility security requirements. These requirements include
the use of monitored closed circuit cameras in key areas, access controls, and continuously guarded entries
and exits. Protective measures have also been put in place to guard products against theft and tampering
during transport as part of an industry-leading logistics program. This program provides a continuously staffed
command center to monitor select inbound and outbound shipments across the globe. This process ensures
that shipments make it from one destination to another securely and without disruption.