Private bug reported:

Secure Boot and Secured Update are foundational platform security features 
designed to ensure system integrity from boot through runtime updates.
Secure Boot establishes a hardware root of trust and verifies the authenticity 
and integrity of firmware, bootloaders, and the operating system before 
execution. It prevents unauthorized or malicious code from being loaded during 
the boot process by enforcing cryptographic signature validation.
Secured Update extends this trust model to firmware and software updates, 
ensuring that only authenticated, signed, and verified updates are applied to 
system components such as BIOS/UEFI, BMC firmware, and device firmware. This 
protects against supply chain attacks, rollback attacks, and unauthorized 
modifications.
In the Linux kernel, Secure Boot is supported through UEFI Secure Boot 
mechanisms, kernel signature verification, and trusted key management. Secured 
Update workflows involve coordination between firmware, OS tools, and 
management frameworks (e.g., capsule updates, fwupd). However, enhancements are 
needed for better integration, visibility, and policy enforcement across 
platform components.

Feature Request:
Requested details to be enabled on OS:
  Ensure full support for UEFI Secure Boot (key enrollment, signature 
verification, revocation lists). 
  Enable kernel and module signature enforcement under Secure Boot. 
  Support secure firmware update mechanisms (UEFI capsule updates, signed 
payloads). 
  Integrate secured update workflows with OS tools (e.g., fwupd, LVFS where 
applicable). 
  Provide mechanisms for rollback protection and version control of firmware 
updates. 
  Expose Secure Boot status and configuration via sysfs and user-space tools. 
  Enable logging and auditing of Secure Boot and update events. 
  Support secure update of device firmware (PCIe/CXL devices, NICs, storage). 
  Integrate with platform management frameworks (BMC, Redfish) for remote 
updates. 
  Provide policy controls for update authorization and enforcement. 
  Ensure compatibility with virtualization environments and confidential 
computing setups. 
  Document Secure Boot configuration, key management, and secured update 
workflows.

Business Justification:
  Protects system from unauthorized code execution during boot. 
  Ensures integrity and authenticity of firmware and software updates. 
  Mitigates supply chain and firmware-level attacks. 
  Enhances compliance with security standards and regulations. 
  Improves trustworthiness of platform in enterprise and cloud environments. 
  Aligns with modern zero-trust and secure infrastructure strategies.

References:
  UEFI Secure Boot Specification 
  Linux Kernel Secure Boot and Module Signing Documentation 
  fwupd and LVFS Documentation 
  NIST and Industry Security Guidelines for Firmware Protection

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2146711

Title:
  Request for Security Support – Secure Boot and Secured Update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2146711/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to