Hardware and Virtualization Flashcards

(36 cards)

1
Q

What should be considered when implementing new hardware?

A
  • Who is manufacturing the hardware
    and how do we trust that the components building the final product are clean and free
    from vulnerabilities?
  • How do we validate that no additional components have been added that could compromise our security and privacy?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a “Shielded Virtual Machine”?

A

Shielding a VM allows it to only be run on an approved host and prevents unauthorized access within the environment, offline or outside of the protected environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are “shielded VMs” implemented in the Microsoft ecosystem?

A

Enable Guarded Fabric; Guarded
Fabric is the infrastructure component used to enable and protect Shielded VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is required to implement guarded fabric shielded VMs?

A
  • UEFI 2.3.1 (Ensure boot is configured to use UEFI)
  • TPM v2.0
  • Input-output memory management unit (IOMMU) and SLAT
  • Secure Boot enabled
  • Gen 2 VMs w/ min OS of Server 2012
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security threats come with virtualization?

A
  • Hypervisor threats.
  • VM escape or the ability to interact with the physical host OS or hypervisor directly
    from a VM.
  • Non-segregation of resources, network, and data.
  • VM sprawl.
  • Non-encrypted storage, physical drives, virtual disk files, and network traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should virtualized infrastructure be isolated to improve security?

A

Isolate and segment different virtualized environments; The management
plane, the production environment, the demilitarized zone (DMZ), and highly
confidential applications and databases should be separated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is way to validate potential hardware/software purchases?

A

Ensuring your hardware is certified and compatible with current systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “firmware” and its function?

A

A firmware interface is typically low-level software that acts as the medium between the OS and hardware to provide a basic UI for configuring device features and providing instructions for the boot procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two common forms of firmware in Windows?

A

BIOS and UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does BIOS function?

A

BIOS is loaded directly onto a PC motherboard. Its purpose is to initialize the
physical hardware and eventually boot into Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is NIST’s recommendations for securing BIOS?

A
  • Use an authenticated BIOS update mechanism with digital signatures to validate the integrity of updates.
  • Secure the local update process with system passwords and physical locks, or only allow BIOS updates through a local update process with a physical information
    technology (IT) presence.
  • Use integrity protection features to prevent modifications to BIOS.
  • Implement non-bypassability features to ensure only the authenticated update
    mechanism is used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does UEFI differ from BIOS?

A
  • UEFI does not rely on a boot sector to copy an MBR and uses what’s
    known as a boot manager to determine what to boot
  • The traditional BIOS runs 16-bit
    code and leverages only the MBR, which presents limitations such as support for drives larger than 2 terabytes (TB). UEFI uses the GUID Partition Table (GPT) and supports 32-bit or 64-bit code
  • UEFI incorporates security technologies such as Secure Boot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the first phase of UEFI?

A

Security Phase (SEC). This acts as a core root of trust (or boot block in BIOS) to validate the integrity of the code and other firmware components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the Security Phase of UEFI protect a host?

A

If a boot loader has been replaced by malicious code, it won’t be allowed to execute based on an invalid or revoked digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are features of UEFI?

A
  • Password settings that include setting a supervisor password and lock settings,
    preventing users from making changes without entering the supervisor password.
    You can also require a password at unattended boot, at restart, and even at the boot device list.
  • Fingerprint settings to use biometrics during pre-desktop authentication as an
    alternative or in conjunction with entering a supervisor password.
  • Security chip settings for the TPM.
  • UEFI BIOS update settings to add protection regarding BIOS updates,
    including rollbacks.
  • Memory protection for execution prevention against virus and worm attacks that create memory buffer overflows.
  • Virtualization settings to enable or disable virtualized hardware support such as
    Intel VT-x or AMD-V.
  • I/O port access to enable or disable the use of devices such as wireless, Bluetooth,
    USBs, cameras, and microphones.
  • Internal device access tamper detection of the physical covers of storage devices.
  • Anti-theft to enable a lo-jack for your PC using a third-party provider.
  • Secure Boot settings.
  • Trusted execution environments (TEEs) such as Intel Software Guard Extensions
    (SGX) for hardware-based isolation of application code in memory.
  • Device Guard, which is a feature set that consists of Configurable Code Integrity
    (CCI), Virtual Secure Mode (VSM) Protected Code Integrity, and Secure Boot.
    Device Guard features set the foundation for VBS, which we will discuss in more
    detail later.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the “secure boot” feature of UEFI

A

Ensures only trusted software and firmware can execute in the boot chain.

17
Q

How does secure boot secure the boot chain of an OS/PC?

A

Each software, driver firmware, and OS boot loader (Windows Boot Manager) has a digital signature or hash that is validated by referencing signature keys stored in the Secure Boot database.

18
Q

What are the components of secure boot?

A

Platform Key (PK); Key Exchange Key (KEK) with a public/private key pair; safelist database (db); revoked signature database (dbx)

19
Q

What is the purpose of the safelist database (db) and revoked signature database (dbx) in UEFI secure boot?

A

These allow or deny databases are used for validation against the certificates, keys, or image hashes of boot loaders, firmware, and drivers.

20
Q

What is the role of the platform key in UEFI secure boot?

A

Created by the OEM that creates the trust to
the Key Exchange Key (KEK); Essential for verifying the authenticity of the KEK and ensuring that only trusted keys are enrolled in the system.

21
Q

What is the role of the “key exchange key KEK)” in UEFI secure boot?

A

Used to update the signature database (db) and the forbidden signature database (dbx); Allows the operating system and third-party applications to add new public keys to the db and dbx; Ensures that only authorized KEKs can be installed.

22
Q

Describe “TPM”

A

TPM provides hardware-based security, typically in the form of a tamper-resistant chip built directly onto a motherboard; TPMs primarily deal with the encryption and decryption of security keys in isolation; Each TPM chip has its own unique RSA private key

23
Q

Where IS TPM enabled on a device?

A

The TPM security chip is typically enabled in the Security tab of the UEFI setup

24
Q

Describe “Windows Defender Credential Guard” and its purpose

A

Helps protect user authentication and access tokens in the Local Security Authority Subsystem Service (LSASS) from being stolen

25
What mechanism protects the kernel?
HVCI
26
How does "HVCI" secure the kernel?
Helps to ensure that the code integrity service used to validate the signatures of drivers and kernel-mode processes are contained with hypervisor isolation
27
How is HVCI enabled?
Group policy
28
What mechanism was developed to isolate untrusted web session?
Microsoft Defender Application Guard
29
Describe "Microsoft Defender Application Guard"
Application Guard for web browsers protects users from sites that aren't defined as trusted in a network isolation policy configuration. Whenever a site is opened that's not in this policy, a new containerized browsing session is opened in Microsoft Edge isolating this session from user and kernel-mode attacks; built-in support for Microsoft Office and Edge browser but also extends these features to Google Chrome and Firefox through browser extensions.
30
How can Microsoft Defender Application Guard be enabled?
Microsoft Endpoint Manager, Group Policy, or Configuration Manager.
31
What mechanisms have been created to protect stolen devices at the hardware security level?
Secure Memory Encryption (AMD) and Total Memory Encryption (Intel TME)
32
Describe "Secure Memory Encryption (AMD)"
Specific to AMD-based systems; Pages in the memory are encrypted through page tables using a 128-bit ephemeral Advanced Encryption Standard (AES) key that is generated at random during boot time and is not accessible by external software.
33
Can Secure Memory Encryption (AMD) secure VMs? If so, how?
Yes; Secure Encrypted Virtualization (SEV), which allows VMs to run fully encrypted and can only be decrypted by the underlying VM itself.
34
Where is Secure Memory Encryption (AMD) enabled?
SME can be enabled in the BIOS of AMD systems.
35
Describe "Total Memory Encryption (Intel TME)"
Intel TME encrypts memory using AES XTS with a randomly generated encryption key that is not accessible to software.
36
What are hardware/virtualization security best practices?
* Only purchase hardware that has been through a proper hardware certification program; Windows Hardware Compatibility Program certification process. * Keep your hardware up to date. * Have an effective and secure system for upgrading firmware/BIOS and ensure the proper protections are enabled to ensure only approved sources can update them. * Purchase physical hardware that supports BitLocker (TPM 2.0), DRTM, SMM, Secure Boot, DMA Protection, Memory Encryption (AMD/Intel), and hardware￾based isolation of application code in memory (TEE with Intel SGX). This will allow you to enable software features that support hardware-based security. * Turn on VBS as soon as possible and enable Credential Guard, HVCI, Application Guard, Windows Defender Application Control, and Kernel DMA Protection to put the power of your hardware into action. * Ensure your data is also protected if lost or stolen by protecting your data stored in memory with encryption. SME (AMD) and Intel TME features provide this level of security for your data. * Ensure you are aware of the latest risks and hardware weaknesses with resources available to you, such as the NIST Cybersecurity Supply Chain Risk Management project and CWE's Most Important Hardware Weaknesses list. * Subscribe to receive notifications as vulnerabilities are identified.