NIST SP 800-193: BIOS 平台固件弹性指南

NIST SP 800-147,BIOS 保护指南 

( NIST SP 800-147 [1]、NIST SP 800-147B [2])解决了 BIOS 的保护问题

可从此处免费获得:

https://doi.org/10.6028/NIST.SP.800-193

摘要

此文档提供了关于支持平台固件和数据对抗潜在地具有破坏性的攻击的弹性的技术指导意见和建议。平台是启动和运行一台系统所需的功能硬件和固件的集合。针对平台固件的成功攻击可以使得系统不可运行,可能是永久的,或者要求由原始制造商重新编程,造成对用户的重大妨碍。此文档中的指导意见通过描述下列安全机制来提升平台的弹性:保护平台防止非授权更改、检测已发生的非授权更改,以及快速和安全地从攻击中恢复。包括原始设备制造商(OEM)和组件/设备提供商在内的实现者可以利用这些指导意见以便在平台中构建更强的安全机制。系统管理员、安全专业人士和用户可以利用此文档以便为未来的系统指导采购策略和优先级。

关键字

BIOS;代码签名;固件;Option ROM;平台固件

NIST SP 800-193: BIOS 平台固件弹性指南

固件开发 bios  ,可信  安全  

 

 

 认证更新机制   

完整性保护

不可绕过性

 可信根(RoT)和信任链(CoT)

 平台固件的保护、检测、恢复

  1. 固件更新镜像将要使用如同 FIPS 186-4,数字签名标准 [7] 所具体说明的一种受批准的数字签名算法签名,它具有至少 112 位的安全强度,以符合 SP 800-57,关于密钥管理的建议——第 1 部分:总则 [8] 的要求
  2. 每一个固件更新镜像将要由某个授权实体——通常是设备制造商、平台厂商或者可信的第三方——签名以满足 SP 800-89,关于获取用于数字签名应用程序的担保的建议 [9] 的要求

 

引用

 

This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization —either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware). As used in this publication, the term BIOS refers to conventional BIOS, Extensible Firmware Interface (EFI) BIOS, and Unified Extensible Firmware Interface (UEFI) BIOS. This document applies to system BIOS firmware (e.g., conventional BIOS or UEFI BIOS) stored in the system flash memory of computer systems, including portions that may be formatted as Option ROMs. However, it does not apply to Option ROMs, UEFI drivers, and firmware stored elsewhere in a computer system. Section 3.1 of this guide provides platform vendors with recommendations and guidelines for a secure BIOS update process. Additionally, Section 3.2 provides recommendations for managing the BIOS in an operational environment. Future revisions to this publication will also address the security of critical system firmware that interact with the BIOS. While this document focuses on current and future x86 and x64 client platforms, the controls and procedures are independent of any particular system design. Likewise, although the guide is oriented toward enterprise-class platforms, the necessary technologies are expected to migrate to consumer-grade systems over time. Future efforts may look at boot firmware security for enterprise server platforms.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值