Section 7: Supply Chain Management Flashcards
(41 cards)
What should you do when getting a new vendor?
Due Diligence
What is Due Diligence?
A legal principle identifying a subject has used best practice or reasonable care when setting up, configuring, and maintaining a system
What does Due Diligence include?
- Properly resourced cybersecurity program
- Security assurance and risk management processes in place
- Product support life cycle
- Security controls for confidential data
- Incident response and forensics assistance
- General and historical company information
- financials
Should Due Diligence apply to all suppliers and contractors?
Yes
What is Trusted Foundry?
A microprocessor manufacturing utility that is part of a validated supply chain (one where hardware and software does not deviate from its documented function)
Who is the Trusted Foundry Program operated by?
Department of Defence (DoD)
What does the Trusted Foundry do?
It ensures that microprocessors in the supply chain are secure and are run by the department of defence
What is Hardware Source Authenticity?
Process of ensuring that the hardware is procured tamper-free from trustworthy suppliers
- A router for example, do you buy it from CISCO directly? one of their suppliers? or Ebay?
- depending on what you do, it will be more or less trustworthy
Does obtaining Counterfeit & Compromised devices purchased from second-hand or aftermarket sources result in greater risk?
Yes
What is a Hardware Root of Trust (ROT)?
A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics
Is Trusted Platform Module a Root of Trust?
Yes
What is a Hardware Root of Trust used for?
To scan the boot metrics and OS to verify their signatures, which we can then use to sign a digital report
- essentially a digital certificate
- embedded inside your processor or firmware
Which is the most common form of ROT?
TPM - Trusted Platform Module (on motherboard)
- A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information
What are the TPM’s functions?
- Provide Secure I/O
- random number generator
- RSA key generator
- SHA-1 hash generator
- encryption-decryption-signature engine - Persistent Memory
- Endorsement Key (EK)
- Storage Root Key (SRK) - Versatile Memory
- Platform Configuration Registers (PCR)
- Attestation Identity Keys (AIK)
- Storage Keys
Remember for the exam!
The trusted platform module is the part of your system that allows you to have the ability that when you boot up you are doing so securely and you can take those reports and digitally sign them using TPM
Where else is TPM also used?
Full Disk Encryption
- BitLocker uses TPM and the key inside TPM
TPM can be managed in Windows via
tpm.msc or group policy
What is a Hardware Security Module (HSM)
An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software-based storage
What are the different ways to create an HSM?
- internal card
- IoT solution
What is the advantage of using a Hardware Security Module (HSM)?
Automated, and that means that the keys cannot be compromised by human involvement
What does anti-tamper mean?
Methods that make it difficult for an attacker to alter the authorised execution of software
- e.g.
-pill bottle has a seal on top, if removed cannot be put back
- shows if someone has been there
What are 2 common anti-tamper mechanisms?
- Field Programmable Gate Array (FPGA)
- Physically Un-cloneable Function (PUF)
- could be used and designed inside your systems
- if tampered with, these will zero out your cryptographic key which then it automatically wipes the system on that information, making you know, that it has been tampered with
What does a firmware exploit do?
Gives an attacker an opportunity to run any code at the highest level of CPU privilege
- BIOS or UEFI
What are some trusted firmwares?
- UEFI - Unified Extensive Firmware Interface
- Secure Boot
- Measured Boot
- Attestation
- eFUSE
- Trusted Firmware Updates
- Self-Encrypting Drives