Supply Chain Assessment Flashcards
Due Diligence
A legal principle identifying a subject has used best practice or reasonable care when setting up, configuring, and maintaining a system
Trusted Foundry
§ A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function)
§ Trusted Foundry Program is operated by the Department of Defense
Hardware Root of Trust (ROT)
§ A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics § A hardware root of trust is used to scan the boot metrics and OS files to verify their signatures, which we can then use to sign a digital report
Trusted Platform Module (TPM)
§ A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information
§ A TPM can be managed in Windows via the tpm.msc console or through group policy
Hardware Security Module (HSM)
An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software-based storage
Unified Extensible Firmware Interface (UEFI)
A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security
Secure Boot
A UEFI feature that prevents unwanted processes from executing during the boot operation
Measured Boot
A UEFI feature that gathers secure metrics to validate the boot process in an attestation report
Attestation
A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key
eFUSE
A means for software or firmware to permanently alter the state of a transistor on a computer chip
Secure Processing
A mechanism for ensuring the confidentiality, integrity, and availability of software code and data as it is executed in volatile memory
Trusted Execution
The CPU’s security extensions invoke a TPM and secure boot attestation to ensure that a trusted operating system is running
Secure Enclave
The extensions allow a trusted process to create an encrypted container for sensitive data
Atomic Execution
Certain operations that should only be performed once or not at all, such as initializing a memory location
Bus Encryption
§ Data is encrypted by an application prior to being placed on the data bus
§ Ensures that the device at the end of the bus is trusted to decrypt the data