lolloj - Fotolia
How can platform firmware be protected from attacks?
The NIST published guidance on building up platform firmware resiliency. Expert Judith Myerson looks at the NIST guidelines and the major takeaways for enterprises.
The National Institute of Standards and Technology, or NIST, published a draft version of the Platform Firmware...
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
Resiliency Guidelines earlier in 2017. What does this NIST publication recommend to protect firmware against destructive attacks?
To protect firmware against destructive boot and runtime attacks, the NIST provides guidelines for supporting the resiliency of platform firmware. The guidelines address the issue of firmware that was not properly implemented, such as in a traditional x86 platform of personal computer clients and network devices. The guidelines focus on protecting the platform against unauthorized changes and recovering from attacks rapidly.
To ensure a computing system can be operated free from malware, firmware code and critical data must be uncorrupted. Firmware code is a set of instructions used by any device's processing unit to perform operations on the device. Critical data includes configuration settings and policies, including the system's boot order, for instance.
Firmware update images must be authenticated and authorized when applied to platform devices such as embedded controllers, host processors and network interface controllers. Authentication is provided by the device or system manufacturer. Authorization from the device or system owner is needed to perform updates. Not all vendors provide platform firmware updates that can patch vulnerabilities, fix bugs or add new functionality.
Platforms are often comprised of multiple devices from different manufacturers and vendors. A platform may need multiple independent roots of trust and chains of trust to achieve complete platform firmware resiliency. A hard disk controller may have a separate microcontroller and firmware from the host platform. Both the hard disk controller and the host platform may need their own independent chain of trust for recovery if the critical data becomes corrupted.
Original equipment manufacturers and component/device suppliers can use the NIST guidelines to build platforms with stronger security mechanisms. System administrators, security professionals and users can use the guidelines to guide procurement and firmware update strategies.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Dig Deeper on Data security and privacy
Related Q&A from Judith Myerson
Site-to-site VPN security benefits and potential risks
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not ... Continue Reading
Should I worry about the Constrained Application Protocol?
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
How can I protect my self-encrypting drives?
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading