Lesson 12 - Implementing Host Security Solutions Flashcards
A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics.
hardware Root of Trust (RoT)
A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information.
trusted platform module (TPM)
Each TPM is hard-coded with a unique, unchangeable asymmetric private key called the endorsement key. This endorsement key is used to create various other types of subkeys used in key storage, signature, and encryption operations.
A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.
unified extensible firmware interface (UEFI)
A UEFI feature that prevents unwanted processes from executing during the boot operation.
Secure boot
Secure boot requires UEFI, but does not require a TPM.
A UEFI feature that gathers secure metrics to validate the boot process in an attestation report.
Measured Boot
Report of boot state integrity data that is signed by a tamper-proof TPM key and reported to a network server.
Boot Attestation
Encryption of all data on a disk (including system files, temporary files, and the pagefile) can be accomplished via a supported OS, thirdparty software, or at the controller level by the disk device itself.
Full disk encryption (FDE)
Disk encryption can be applied to both hard disk drives (HDDs) and solid state drives (SSDs).
FDE requires the secure storage of the key used to encrypt the drive contents.
One of the drawbacks of FDE is that, because the OS performs the cryptographic operations, performance is reduced.
A disk drive where the controller can automatically encrypt data that is written to it.
Self-Encrypting Drives (SED)
the cryptographic operations are performed by the drive controller. The SED uses a symmetric data/media encryption key (DEK/MEK) for bulk encryption and stores the DEK securely by encrypting it with an asymmetric key pair called either the authentication key (AK) or key encryption key (KEK). Use of the AK is authenticated by the user password. This means that the user password can be changed without having to decrypt and re-encrypt the drive.
In storage encryption, the private key that is used to encrypt the symmetric bulk media encryption key (MEK). This means that a user must authenticate to decrypt the MEK and access the media.
Key Encryption Key (KEK)
Standards for implementing device encryption on storage devices.
Opal
Product life cycle phase where sales are discontinued and support options reduced over time.
End of Life (EOL)
Product life cycle phase where support is no longer available from the vendor.
End of Service Life (EOSL)
Usually a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve the exchange of money.
Memorandum of understanding (MOU)
Agreement by two companies to work together closely, such as the partner agreements that large IT companies set up with resellers and solution providers.
Business partnership agreement (BPA)
Legal basis for protecting information assets.
Nondisclosure agreement (NDA)
Operating procedures and standards for a service contract.
Service level agreement (SLA)
A contractual agreement setting out the detailed terms under which a service is provided.
Evaluates the data collection and statistical methods used by a quality management process to ensure they are robust.
Measurement systems analysis (MSA)