Lesson 12 Host security solutions Flashcards
HW RoT
HW Root of Trust
is a secure subsystem that is able to provide attestation
it scans the boot metrics and OS files to verify their signatures
It then signs the report and sends it to the NAC Server
Attestation
A statement made by the system can be trusted by the receiver
Uses signing keys to do this
TPM
Trusted Platform Module
Part of the motherboard chipset or an embedded function of the CPU
Stores encryption keys, hashed passwords, and other user and platform identification information
Hardcoded with a unique, unchangeable asymmetric key called an endorsement key
Thief cannot remove like they could with the HSM
UEFI
Unified Extensible Firmware Interface
is the code that allows a host to boot to an OS
enforces a number of Boot Integrity checks
Secure Boot
Prevents a computer from being hijacked by malicious OS
Requires UEFI, which stores certs from valid OS vendors
The systems firmware can then compare the stored cert has been signed by the OS Vendor
Does not require a TPM
Measured Boot
Uses TPM at each stage of the boot
Checks hashes of the key system state data for changes
Records presence of kernel-level code change but does not prevent boot
Boot Attestation
The capability to transmit boot log report signed by the TPM via a trusted process to the remote server, usually the network access control server
log is analyzed for compromise, like unsigned drivers
If compromise or lack of report, the host can be prevented from joining the network
Disk Encryption - FDE
Full Disk Encryption - entire disk, including system files, are encrypted
Thwarts an attacker trying to attach the disk to an different OS
as it requires the encryption key to use the disk contents
Win BitLocker tool can write keys to the TPM’s secure storage area or a USB drive
Can reduce performance as the OS has overhead for the cryptographic functions
Can be mitigated by SED, self encrypting drives
SED
Self Encrypting Drive
performs cryptographic functions by the drive controller not the OS
Data/Media Encryption Key (DEK/MEK) for bulk encryption
DEK is stored securely in asymmetric key pair named either authentication key (AK) or Key Encryption Key (KEK)
The AK is authenticated by the user password, which means you can change the user password without needing to decrypt and re-encrypt the drive
USB/Flash Drive Security measures
Suspected USB or flash drives should be tested on sandboxed lab, known as ‘sheep dip’
Look for cmd prompt windows or nefarious processes starting attempting to modify system files or register
HIDS (host intrusion detection systems) can block most USB ports
Host should always be configured to not auto run USB devices are attached to prevent malware from being installed, which is most commonly found on these types of drives.
Trustworthy supply chain
Supply chain is the end to end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer
Establishment of trusted supply chain means denying malicious actors the time or resources to modify the assets being supplied
End of life systems
End of Life (EOL)
- discontinued sale of a product, spares and upgrades become limited
End of Service Life (EOSL)
- system which is no longer supported by it developer or vendor
- receives no security updates and is therefore a critical vulnerability if left in use
- a compensating control is to isolated these types of devices if still needed on the system
MOU
Memorandum of Understanding
- Intent to work together
- Relatively informal with no binding contracts
BPA
Business Partnership Agreement
Establish a formal partner relationship
NDA
Non-Disclosure Agreement
governs use and storage of confidential and private information