I have some questions about UEFI and the below excerpts from NIST
SP-147, from sections 3.1.1 and 3.2.

Is this "gold master image" possible with UEFI? Are any enterprises
practicing this? What tools are they using? I can't any information on
any enterprise who does this today.

I currently doubt it is possible with UEFI, given how little information
-- by UEFI Forum, IBVs, OEMs or IHVs -- is provided to system owners on
how to backup/restore their BIOS.  At least I can't find any info so far.

Can anyone point me to a case where an organization can "assert greater
control" or "actively participate in the update process", like below?

Most of the security in these guidelines are based on crypto, yet I've
yet to find a CRL or OSCP URL by an IBV/OEM/IHV for any of their UEFI
signed code.

Can anyone point to a case where someone is able to test the security of
this signed code?

How can "multi-party control" with below PKI if the enterprise can't
even access the original keys?

I could see the below with UEFI in a fully-open source firmware
scenerio. But all UEFI IBVs are closed-source, and Intel's FSP is
closed-source, so I don't see how mainstream UEFI-based systems can be
used with 147 enterprise guidelines.

If anyone can point to any more info on this, please speak up.

I'm giving a talk to some sysadmins on integrating SP-147 with UEFI
along with traditional hardware lifecycle models on Thursday... :-)

Thanks,
Lee
RSS: http://firmwaresecurity.com

----snip----

Some organizations may wish to assert greater control over BIOS updates
in high-security environments. The authenticated update mechanism may be
designed to permit organizational control over the update process, where
updates to the BIOS or rollbacks of the BIOS to an earlier version are
permitted only if the update or rollback has been authorized by the
organization. For example, specific BIOS images could be authorized by
an organization by countersigning them with an organization-controlled
key, which would be verified during the update process.

Provisioning Phase:
It is crucial that the organization institute a mechanism for
identifying, inventorying, and tracking the different computer systems
across the enterprise throughout their life cycle. Identifying and
monitoring the BIOS image characteristics such as manufacturer name,
version, or time stamp allows the organization to perform update,
rollback, and recovery. The organization should maintain a “golden
master image” for each approved system BIOS, including superseded
versions, in secure offline storage.
If the platform has a configurable Root of Trust for Update (RTU), the
organization needs to maintain a copy of the key store and signature
verification algorithm. If the RTU is integrated into the system BIOS
then this guideline is satisfied by maintaining the golden BIOS image.
If the RTU is not integrated into the system BIOS, the security afforded
the RTU should be at least as strong as that for the golden BIOS image.
Most organizations will rely upon the manufacturer as the source for the
authenticated BIOS. In this case, the organization does not maintain any
private keys, and the RTU contains only public keys provided by the
manufacturer. Where the organization prefers to participate actively in
the BIOS authentication process by countersigning some or all approved
system BIOS updates, the RTU may contain one or more public keys
associated with the organization. In this case, the organization must
securely maintain the corresponding private key so that the next BIOS
update can be signed. Private keys should be maintained under
multi-party control to protect against insider attacks. For
organizational keys, the corresponding public keys must also be
maintained securely (to ensure authentication of origin).

Operation and Maintenance Phase:
Where the organization participates actively in the update process, the
multi-party control process must be executed to retrieve the private key
from secure storage and generate the digital signature. The BIOS
installation package should also be signed, and the digital signature
should be verified before execution. Once the update has executed
successfully, the configuration baseline should be validated to confirm
that the computer system is still in compliance with the organization’s
defined policy.

Disposition Phase:
Before the computer system is disposed and leaves the organization, the
organization should remove or destroy any sensitive data from the system
BIOS. The configuration baseline should be reset to the manufacturer’s
default profile; in particular, sensitive settings such as passwords
should be deleted from the system and keys should also be removed from
the key store. If the system BIOS includes any organization-specific
customizations then a vendor-provided BIOS image should be installed.
This phase of the platform life cycle reduces chances for accidental
data leakage.

----snip----

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to