Section 7 Supply Chain Management Flashcards
A legal principle identifying a subject has used best practice or reasonable care when setting up, configuring, and maintaining a system.
Due Diligence
A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function).
Trusted Foundary
The process of ensuring that hardware is procured tamper free from trustworthy suppliers.
Hardware Source Authenticity
A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics.
Hardware Root of Trust (ROT)
Methods that make it difficult for an attacker to alter the authorized execution of software.
Anti-Tamper
UEFI, secure boot, measured boot, attestation, eFUSE, trusted firmware updates, self encrypting drives.
Trusted Firmwares
A type of system firmware providing support for 64 bit CPU operations at boot, full GUI and mouse operation at boot, and better boot security.
Unified Extensible Firmware Interface (UEFI)
A UEFI feature that prevents unwanted processes from executing during the boot operating.
Secure Boot
A UEFI feature that gathers secure metrics to validate the boot process in an attestation report.
Measured Boot
A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key.
Attestation
A means for software or firmware to permanently alter the state of a transistor on a computer chip.
eFUSE
A firmware update that is digitally signed by the vendor and trusted by the system before installation.
Trusted Firmware Updates
A disk drive where the controller can automatically encrypt data that is written to it.
Self Encrypting Drives
A mechanism for ensuring the confidentiality, integrity, and availability of software code and data as it is executed in volatile memory.
Secure Processing
Low level CPU changes and instructions that enable secure processing.
Processor Security Extensions