Section 7: Supply Chain Management Flashcards

1
Q

What should you do when getting a new vendor?

A

Due Diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Due Diligence?

A

A legal principle identifying a subject has used best practice or reasonable care when setting up, configuring, and maintaining a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Due Diligence include?

A
  • Properly resourced cybersecurity program
  • Security assurance and risk management processes in place
  • Product support life cycle
  • Security controls for confidential data
  • Incident response and forensics assistance
  • General and historical company information
    • financials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Should Due Diligence apply to all suppliers and contractors?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Trusted Foundry?

A

A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is the Trusted Foundry Program operated by?

A

Department of Defence (DoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Trusted Foundry do?

A

It ensures that microprocessors in the supply chain are secure and are run by the department of defence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hardware Source Authenticity?

A

Process of ensuring that the hardware is procured tamper-free from trustworthy suppliers

  • A router for example, do you buy it from CISCO directly? one of their suppliers? or Ebay?
  • depending on what you do, it will be more or less trustworthy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does obtaining Counterfeit & Compromised devices purchased from second-hand or aftermarket sources result in greater risk?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hardware Root of Trust (ROT)?

A

A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is Trusted Platform Module a Root of Trust?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Hardware Root of Trust used for?

A

To scan the boot metrics and OS to verify their signatures, which we can then use to sign a digital report

  • essentially a digital certificate
  • embedded inside your processor or firmware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is the most common form of ROT?

A

TPM - Trusted Platform Module (on motherboard)

  • A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the TPM’s functions?

A
  1. Provide Secure I/O
    - random number generator
    - RSA key generator
    - SHA-1 hash generator
    - encryption-decryption-signature engine
  2. Persistent Memory
    - Endorsement Key (EK)
    - Storage Root Key (SRK)
  3. Versatile Memory
    - Platform Configuration Registers (PCR)
    - Attestation Identity Keys (AIK)
    - Storage Keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remember for the exam!

A

The trusted platform module is the part of your system that allows you to have the ability that when you boot up you are doing so securely and you can take those reports and digitally sign them using TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where else is TPM also used?

A

Full Disk Encryption

  • BitLocker uses TPM and the key inside TPM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TPM can be managed in Windows via

A

tpm.msc or group policy

18
Q

What is a Hardware Security Module (HSM)

A

An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software-based storage

19
Q

What are the different ways to create an HSM?

A
  1. internal card
  2. IoT solution
20
Q

What is the advantage of using a Hardware Security Module (HSM)?

A

Automated, and that means that the keys cannot be compromised by human involvement

21
Q

What does anti-tamper mean?

A

Methods that make it difficult for an attacker to alter the authorised execution of software
- e.g.
-pill bottle has a seal on top, if removed cannot be put back
- shows if someone has been there

22
Q

What are 2 common anti-tamper mechanisms?

A
  1. Field Programmable Gate Array (FPGA)
  2. Physically Un-cloneable Function (PUF)
  • could be used and designed inside your systems
  • if tampered with, these will zero out your cryptographic key which then it automatically wipes the system on that information, making you know, that it has been tampered with
23
Q

What does a firmware exploit do?

A

Gives an attacker an opportunity to run any code at the highest level of CPU privilege

  • BIOS or UEFI
24
Q

What are some trusted firmwares?

A
  1. UEFI - Unified Extensive Firmware Interface
  2. Secure Boot
  3. Measured Boot
  4. Attestation
  5. eFUSE
  6. Trusted Firmware Updates
  7. Self-Encrypting Drives
25
Q

What is a Unified Extensive Firmware Interface (UEFI)?

A

Type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security

26
Q

What is Secure Boot?

A

Feature of UEFI that prevents unwanted processes from executing during the boot operation
- makes sure digital signatures are present from authorised vendors
- if windows are not signed it will not boot
- prevents loading of malware

27
Q

What is Measured Boot?

A

A UEFI feature that gathers secure metrics to validate the boot process in an attestation report

  • how much process does it take to do a certain task
  • takes the data, creates a report, and attests to it
28
Q

What is Attestation?

A

A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key

  • UEFI takes this report, signs it with the digital key and sends it to the OS and CPU
29
Q

What is eFUSE?

A

A means for software or firmware to permanently alter the state of a transistor on a computer chip

  • electronic fuse
  • uses one time programming to seal cryptographic keys during firmware development
  • if someone messes with it, it blows the fuse making it no longer trusted
30
Q

What is a Trusted Firmware Update?

A

A firmware update that is digitally signed by the vendor and trusted by the system before installation

31
Q

What is a Self-Encrypting Drive?

A

A disk drive where the controller can automatically encrypt the data that is written to it

  • a software on a chip
  • does the encryption when the data is written on them
  • does the decryption when the data is being read from the drive
32
Q

What is Secure Processing?

A

A mechanism for ensuring the confidentiality, integrity, and availability of software code and data as it is executed in volatile memory

33
Q

What are 5 ways of secure processing?

A
  1. Processor Security Extensions
  2. Trusted Execution
  3. Secure Enclave
  4. Atomic Execution
  5. Bus Encryption
34
Q

What are Processor Security Extensions?

A

Low-level CPU changes and instructions that enable secure processing

35
Q

Processor Security Extensions for AMD

A
  1. Secure Memory Encryption (SME)
  2. Secure Encrypted Virtualisation (SEV)
36
Q

Processor Security Extensions for INTEL

A
  1. Trusted Execution Technology (TXT)
  2. Software Guard Extensions (SGX)
37
Q

What is Trusted Execution?

A

The CPU’s security extensions invoke a TPM and secure boot attestation to ensure that a trusted operating system is running

38
Q

What is a Secure Enclave?

A

The extensions allow a trusted process to create an encrypted container for sensitive data

  • prevents buffer overflow attacks
  • can store encryption keys and other sensitive data inside the secure enclave
39
Q

What is an Atomic Execution?

A

Certain operations that should only be performed once or not at all, such as initialising a memory location

  • prevents buffer overflows
  • prevents race conditions
40
Q

What is a Bus Encryption?

A

Data is encrypted by an application prior to being placed on the data bus

  • ensure that the device at the end of the bus is trusted to decrypt the data
41
Q

What is HDCP?

A

An example is if you get unauthorised HDCP it means that your bus encryption failed.

-This is in place to stop copyrights