Section 7: Supply Chain Management Flashcards
What should you do when getting a new vendor?
Due Diligence
What is Due Diligence?
A legal principle identifying a subject has used best practice or reasonable care when setting up, configuring, and maintaining a system
What does Due Diligence include?
- Properly resourced cybersecurity program
- Security assurance and risk management processes in place
- Product support life cycle
- Security controls for confidential data
- Incident response and forensics assistance
- General and historical company information
- financials
Should Due Diligence apply to all suppliers and contractors?
Yes
What is Trusted Foundry?
A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function)
Who is the Trusted Foundry Program operated by?
Department of Defence (DoD)
What does the Trusted Foundry do?
It ensures that microprocessors in the supply chain are secure and are run by the department of defence
What is Hardware Source Authenticity?
Process of ensuring that the hardware is procured tamper-free from trustworthy suppliers
- A router for example, do you buy it from CISCO directly? one of their suppliers? or Ebay?
- depending on what you do, it will be more or less trustworthy
Does obtaining Counterfeit & Compromised devices purchased from second-hand or aftermarket sources result in greater risk?
Yes
What is a Hardware Root of Trust (ROT)?
A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics
Is Trusted Platform Module a Root of Trust?
Yes
What is a Hardware Root of Trust used for?
To scan the boot metrics and OS to verify their signatures, which we can then use to sign a digital report
- essentially a digital certificate
- embedded inside your processor or firmware
Which is the most common form of ROT?
TPM - Trusted Platform Module (on motherboard)
- A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information
What are the TPM’s functions?
- Provide Secure I/O
- random number generator
- RSA key generator
- SHA-1 hash generator
- encryption-decryption-signature engine - Persistent Memory
- Endorsement Key (EK)
- Storage Root Key (SRK) - Versatile Memory
- Platform Configuration Registers (PCR)
- Attestation Identity Keys (AIK)
- Storage Keys
Remember for the exam!
The trusted platform module is the part of your system that allows you to have the ability that when you boot up you are doing so securely and you can take those reports and digitally sign them using TPM
Where else is TPM also used?
Full Disk Encryption
- BitLocker uses TPM and the key inside TPM