Hardware Assurance
Malware for hardware? Of course!
Supply chain assessments
Trust off the shelf products?
Vendor Assessment
Risk management
Support
Forensic assistance
Historical reliability
Second-hand / grey market
Trusted Foundry
Hardware Root of Trust (RoT) or Trust Anchor
Secure subsystem providing attestation
RoT implemented as a Trusted Platform Module (TPM) chip
Crytpographic processor and storage
Endorsement key
Tamper proof. Crypto shredding
PUF – Physical Unclonable Function
Tpm.msc
Hardware Security Modules (HSM)
Alternative to TPM
Removable, appliance or PCI card
Entrust
Thales
Enabled for cloud services as well
Cryptographic storage in the cloud is called a vault
Trusted firmware
Firmware runs with highest privileges
BIOS
UEFI
Secure boot (digital certs)
Measured boot and attestation (for NAC systems)
Trusted Frimware updates
Whose digital signatures do you trust?
Intel Boot Guard
eFuse
Each firmware update blows one fuse
Number of blown fuses => number of updates/tampering
Self encrypting Drives (SEDs)
Offload crypto operations to the drive itself
Media Encryption Key (MEK)
Key Encryption Key (KEK)
TPM vs password
Secure Processing
Trusted execution – TPM validates OS kernel
Secure enclave – Secure area by a process for crytopgraphic keys
Processor Security Extension – Low level instructions
SME (AMD)
TXT (Intel)
SGE (Intel)
Atomic execution – Protects against race conditions and buffer overflows
TOC/TOU
Bus encryption – Secure data in transit in the hardware.
Last updated