Tampering involves the deliberate altering or adulteration of information, a product, a package, or system. Solutions may involve all phases of product production, distribution, logistics, sale, and use. No single solution can be considered as "tamper proof". Often multiple levels of security need to be addressed to reduce the risk of tampering. Identify who a potential tamperer might be and what level of knowledge, materials, tools, etc. might they have. Identify all feasible methods of unauthorized access into a product, package, or system. In addition to the primary means of entry, also consider secondary or "back door" methods.
Control or limit access to products or systems of interest. Improve the tamper resistance by making tampering more difficult, time-consuming, etc. Add tamper-evident features to help indicate the existence of tampering. Educate people to watch for evidence of tampering. Length of time available for tampering. Particularly in transit, anyone intending to tamper with tamper-evident-protected goods, valuables, cash and confidential documents generally only has a window of opportunity of a few minutes before discovery is likely. This makes it both difficult and unlikely that they will have time to open the packaging, examine or remove the items, and restore the packaging to its original untampered condition.