Supply Chain Management Flashcards
A legal principle identifying a subject
has used best practice or reasonable
care when setting up, configuring,
and maintaining a system
Due Diligence
This essentially means that a vendor like EMC has decided
that the product in question has reached the end of its “useful lifespan.” After this particular
date the manufacturer will no longer be marketing, sustaining and (in most cases) selling
the product in question
End of life
A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function)
Trusted Foundry
The process of ensuring that
hardware is procured tamper-free
from trustworthy suppliers
Hardware Source
Authenticity
A cryptographic module embedded
within a computer system that can
endorse trusted execution and attest
to boot settings and metrics
Hardware Root of Trust
ROT
A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information
Trusted Platform Module
TPM
An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software-based storage
Hardware Security Module
HSM
Methods that make it difficult for an
attacker to alter the authorized
execution of software
Anti-Tamper
It gives an attacker an
opportunity to run any code at the
highest level of CPU privilege
firmware exploit
A type of system firmware providing
support for 64-bit CPU operation at
boot, full GUl and mouse operation
at boot, and better boot security
Unified Extensible Firmware Interface (UEFI)
A UEFI feature that prevents
unwanted processes from executing
during the boot operation
Secure Boot
A UEFI feature that gathers secure
metrics to validate the boot process
in an attestation report
Measured Boot
A claim that the data presented in
the report is valid by digitally signing
it using the TPM’s private key
Attestation
for software or firmware to
permanently alter the state of a
transistor on a computer chip
eFUSE
An update that is digitally
signed by the vendor and trusted by
the system before installation
Trusted Firmware Updates
A disk drive where the controller can
automatically encrypt data that is
written to it
Self-Encrypting Drives
A mechanism for ensuring the confidentiality, integrity, and availability of software code and data as it is executed in volatile memory
Secure Processing
Low-level CPU changes and
instructions that enable secure
processing
Processor Security
Extensions
The CPU’s security extensions
invoke a TPM and secure boot
attestation to ensure that a trusted
operating system is running
Trusted Execution
The extensions allow a trusted
process to create an encrypted
container for sensitive data
Secure Enclave
Certain operations that should only
be performed once or not at all,
such as initializing a
memory location
Atomic Execution
Data is encrypted by an application
prior to being placed on the data bus
Bus Encryption