Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)



Similar documents
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Technical Brief Distributed Trusted Computing

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Trustworthy Computing

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Session ID: Session Classification:

Start building a trusted environment now... (before it s too late) IT Decision Makers

Software Execution Protection in the Cloud

Index. BIOS rootkit, 119 Broad network access, 107

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Hardware Security Modules for Protecting Embedded Systems

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Penetration Testing Windows Vista TM BitLocker TM

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Case Study: Leveraging TPM for Authentication and Key Security

CS 155 Spring TCG: Trusted Computing Architecture

Hi and welcome to the Microsoft Virtual Academy and

Patterns for Secure Boot and Secure Storage in Computer Systems

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Commercially Proven Trusted Computing Solutions RSA 2010

Cisco Trust Anchor Technologies

Lecture Overview. INF3510 Information Security Spring Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure

Disk Encryption. Aaron Howard IT Security Office

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Secure Data Management in Trusted Computing

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications

Software Token Security & Provisioning: Innovation Galore!

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

CLOUD SECURITY: Secure Your Infrastructure

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Property Based TPM Virtualization

Chapter 1: Introduction

SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

Embedded Java & Secure Element for high security in IoT systems

Secure Storage. Lost Laptops

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

Trusted Computing Basics: Self-Encrypting Drives

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Securing the Intelligent Network

Samsung SED Security in Collaboration with Wave Systems

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Security Best Practices for Microsoft Azure Applications

Trusted Platforms for Homeland Security

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Deeper Levels of Security with Intel Identity Protection Technology

Firmware security features in HP Compaq business notebooks

Control your corner of the cloud.

CSE543 Computer and Network Security Module: Cloud Computing

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

The True Story of Data-At-Rest Encryption & the Cloud

The New Key Management:

SAFEAPP TECHNOLOGY PROGRAM

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Dell ControlPoint Security Manager

Acronym Term Description

Full Drive Encryption Security Problem Definition - Encryption Engine

Comparing Free Virtualization Products

Building Blocks Towards a Trustworthy NFV Infrastructure

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Data Protection: From PKI to Virtualization & Cloud

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Windows 7. Qing Liu Michael Stevens

Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015

UNCLASSIFIED Version 1.0 May 2012

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Chapter 4 Application, Data and Host Security

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

How To Protect Your Data From Harm With Safenet

Guidelines on use of encryption to protect person identifiable and sensitive information

Guideline on Safe BYOD Management

Transcription:

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft) and Stacy Cannady (Cisco Systems)

Scope and Audience This webcast is primarily oriented toward CISOs and server/desktop/mobile security decision-makers. They need to respond to the higher end of the threat curve (both ongoing audit and intrusion), while addressing ongoing seismic shifts in IT. Trusted Platform Module (TPM) use cases include higher trust in confidentiality/integrity of handheld devices, desktop/server virtualization, cloud and consumerization of user devices. 2

Why is Hardware Root of Trust Needed? (1) A hardware root of trust can help with a variety of security issues, broadly divided into pre-boot and post-boot. In pre-boot, the TPM helps to secure the boot process against low-level malware and attest/measure integrity In post-boot, TPM can help with multiple use cases, such as root of trust for authentication and sensitive mobile apps like micropayments, as well as network layer security (Trusted Network Connect) 3

Why is Hardware Root of Trust Needed? (2) Malware can embed itself below the operating system (OS), where the software anti-malware packages run. This can be in the OS loader or in third-party boot drivers. One known example (in SANS view, the leading edge of such malware) is Mebromi, thought to be the first BIOS rootkit found in the wild, in 2011 (http://mason.gmu.edu/~msherif/isa564/fall11/projects/bios.pdf). 4

Do I Know You? Can I Trust You? Two basic requirements for transacting business: Do I know you? A computer receives a network connection What is the identity of the requesting computer? What proof is there that the claim of identity is genuine? Can I trust you? How can these two computers establish whether either of them is operating as designed or that a compromise has occurred? Identity alone is not enough for trust what if one computer has been compromised with spyware? What is the basis for a genuine claim of software integrity (or lack thereof)? If you know the answers, you know whether to transact business or not This is Alice Enterprise servers No HW-based identity to confirm it s Alice, so it isn t Alice. Identity Theft This is Alice, but my PC has spyware Enterprise servers HW-based identity check confirms it. The HW also states that Alice s computer is compromised.

The future is already here it s just not evenly distributed. William Gibson $250 Chromebook from Samsung, with TPM for boot integrity of Chrome OS Hardware root of trust for cloud? CloudHSM is an HSM by SafeNet, deployed in Amazon Web Services (AWS), to: securely generate, store, and manage the cryptographic keys used for data encryption such that they are accessible only by you. AWS CloudHSM FAQ 6

Chromebook Use of TPM Google s Chromebook A Self-Healing Computer Power on, measure BIOS with HW security Decide go/no-go, based on measurement match/mismatch If match, proceed to execute BIOS and boot If mismatch, perform rollback to last known good copy This is in a $250 consumer device available now. 7

Chromebook s Solution to Can I Trust You? Chromebook uses TPM to find and correct corruption in firmware 1. TPM and Core Root of Trust for Measurement (CRTM) measure BIOS at boot 2. Measurements are internally verified 3. If a mismatch is found, the offending module is rolled back to the Last Known Good 4. Then boot continues 3. Measurements match expectations 1. Power on 2. CRTM measures BIOS 4. Execute BIOS and boot 3. Mismatch found 3.5 Rollback bad module to last known good copy

PWC s Solution to Do I Know You? Requirement: Security hardware to protect a X.509 certificate for VPN log on Solution must be inexpensive and hassle-free What PWC did: TPM-aware CSP installed under MS-CAPI in PWC PCs PWC identity certs imported into MS-CAPI, under the TPM-aware CSP (TPM protects the cert) User-entered PIN authorizes TPM to release cert for login to PWC networks

PWC and TPM for VPN authentication Chose the TPM route because it s an open standard with multiple vendor support TPM was already in 95% of PwC laptops Considered USB tokens and smartcards, passed on those due to cost of ownership (lost/stolen), not standards-based, didn t want additional device, etc. Already had software PKI in place but wanted hardware-based storage, due to threat of stolen keys Deployed 35,000 endpoints in 2010 (first public mention) 10

PwC and TPM for VPN authentication Gautam Muralidharan from PwC, about the TPM deployment, at a 2011 NSA conference the best kept secret in information security. It is a well defined Open Standard and has low costs to deploy The only universal security device in different brands of PCs that worked for us. https://www.ncsi.com/nsatc11/presentations/tuesday/real_world/muralidharan.pdf 11

CloudHSM in AWS (SafeNet) EAL4+ HSM in a VPC on AWS Hardware root of trust for cryptographic operations Tamper-resistant, secure key management, reduces latency compared to off-cloud HSM Increases security compared with softwarebased key management $5,000 per device, plus usage fees 12

Taking Advantage of Ubiquity Hardware self-encrypting drives (SEDs) for notebooks/servers Hardware Trusted Platform Module (TPM) in tablets/notebooks/servers Virtual TPMs in phones/tablets HSMs in cloud You probably already own a lot of hardware with a TPM in it. If not, look at specifying TPMs in upgrade cycles and planning for use cases that include TPM. 13

Standards-Based, Vendor- and Community-Supported TCG is an open standards organization, supported by hardware and software vendors including: AMD, ARM, Intel & NVIDIA (CPU & GPU) Gemalto, Infineon Technologies & Phoenix (BIOS & security hardware) NetApp, Oracle, Seagate & Western Digital (Storage) Dell, HP, IBM, Lenovo & Sony (Notebooks/Servers) Nokia, Panasonic & Samsung (Mobile) Juniper & Cisco (Network) Microsoft & Red Hat (OS, major closed/open source) Absolute, McAfee, Wave Systems, WinMagic, Credant, Cryptomill, Softex (Management) 14

Standards-Based, Vendor and Community Supported TPM specification version 1.2 is published as ISO/IEC 11889 Parts 1-4. The concept of the hardware root of trust is supported by the National Security Agency (NSA) High Assurance Platform (HAP). NSA s HAP is based on Embedded Security Module (ESM). At boot time and at runtime, a HAP device measures software in a trusted manner before that software is allowed to execute. Source: http://www.nsa.gov/ia/_files/hap_brochure.pdf 15

Standards-based, Vendor and Community Supported The National Institute of Standards and Technology (NIST) has issued several special publications on trust, including firmware/bios security and hardware root of trust (SP-800-147, 155 and 164). From SP-164: Hardware RoTs are preferred over software RoTs due to their immutability, smaller attack surfaces and more reliable behavior. They can provide a higher degree of assurance that they can be relied upon to perform their trusted function or functions. 16

NIST on Hardware Roots of Trust for Mobile Security NIST enumerates hardware roots of trust (or trusted software, perhaps virtual TPM) for: Storage of cryptographic keys and critical security parameters - to verify digital signatures associated with software/firmware and create assertions based on the result -Integrity through the use and maintenance of tamper evident locations for the purpose of securely storing measurements and assertions such as the TPM method for extending Platform Configuration Registers, PCRs) 17

NIST on Hardware Roots of Trust for Mobile Security (Continued) NIST enumerates hardware (or trusted software ) roots of trust for: -Reporting to manage identities and sign assertions for the purposes of generating device integrity reports. It has the capability to reliably cryptographically bind an entity to the information it provides Relies on Measurement and Integrity. -Measurement has the capability to make inherently reliable integrity measurements and is the root of the chain of transitive trust for subsequent measurement agents. <-- Integrity and Reporting roots of trust use the Measurement facility 18

NIST on Hardware Roots of Trust for Mobile Security (Continued) The key point is that mobile devices need to implement the security capabilities and services defined above in trustworthy hardware, firmware and software components. Note that the TPM concept can be implemented in any of those ways. Today we have dedicated hard TPM chips, but also virtual TPMs inside processors. NIST SP-800-164 19

Virtualization (Server) Intel Trusted Execution Technology (TXT) uses hardware binding for VMs spinning up. Requires a TPM. Example use case: Geofencing for regulatory compliance. VMs can t spin up unless run on specific hardware, which is easier to locate than a VM. 20

Intel TXT 2012 The SANS Institute - www.sans.org 21

Virtualization (SecureView Desktop) SecureView is an Air Force Research Lab (AFRL) project with industry, to create secure multi-level workstations (Unclassified up to TS on same machine). TPM is included as part of the unlock mechanism for multiple encrypted virtual machines (VMs), each at its own level. 22

Virtualization (SecureView Desktop) Measured Launch for XenClient Verify Xen Client installation integrity, prevent offline tampering of installation or configuration state Measured Launch Intel TXT used to establish DRTM, measure Xen Client primary components on every boot Extend measurements to include secondary components Trusted Platform Module PCRs reflect the state and configuration of system All XenClient device configuration state is encrypted Encryption key is sealed by the TPM, only released if PCR values match those expected https://www.ncsi.com/nsatc11/presentations/thursday/real_world/durante.pdf Slide 25 23

Virtualization (SecureView Desktop) XenClient XT: Trusted Execution Technology https://www.ncsi.com/nsatc11/presentations/thursday/real_world/durante.pdf Slide 26 24

Virtualization (SecureView Desktop) XenClient XT Architecture https://www.ncsi.com/nsatc11/presentations/thursday/real_world/durante.pdf Slide 22 25

Microsoft s View of TCG and TPM TCG mission is critical for industry Group member and board participant Windows is taking deep dependencies on TCG technologies Using UEFI for root of trust Using TPM for securing data, integrity validation, increased entropy Supporting enhanced SED s for drive data protection We will continue to find new and interesting ways to use UEFI and TPM in future products 2012 The SANS Institute - www.sans.org 26

History of UEFI and TPM IN Windows Windows Vista/7 Windows 8 Windows 8.1 BitLocker Trusted Boot ASLR Bitlocker Measured Boot Virtual Smart Cards Certificate Storage Visual Studio Trusted Boot ASLR Bitlocker Measured Boot Virtual Smart Cards Certificate Storage Visual Studio TPM Key Attestation Provable PC Health 2012 The SANS Institute - www.sans.org 27

TPM Use in Windows Key Features Trusted Boot Leverages UEFI as the Windows root of trust UEFI Secure Boot ensures malware is unable to start before the OS BitLocker Protects data at rest with full volume encryption Uses TPM to protect keys that are used to unlock protected drives Virtual Smartcards Provides 2FA with a virtualized Smart Card solution Uses TPM to protect users digital identity (certificate) 2012 The SANS Institute - www.sans.org 28

TPM Use in Windows Key Features TPM Based KSP Data within the Windows Key Storage Provider is protected with HW Uses TPM to encrypted/decrypt keys; prevents export and replay TPM Key Attestation (new in Windows 8.1) Enables resources to implement access control policy that can request confirmation that certificate and keys being used by a client have been securely provisioned, stored, and maintained Uses TPM related metadata for access control policy Measured Boot Measurements of firmware and critical Windows boot files are taken Uses TPM to securely measure and persist Measured Boot data Provable PC Health (new in Windows 8.1) A free cloud based service that assembles system integrity and security related configuration and sends it to the cloud for remote analysis Uses TPM derived Measured Boot data for health analysis 2012 The SANS Institute - www.sans.org 29

What Will Be Available in the Near Future? Virtual TPM (for example the TrustZone available on ARM devices and Atom on Intel Atom devices) Haswell (new architecture from Intel) Mobile devices with TPMs allow Google to incorporate TPM use in its Five-year Identity Plan (May 2013) 30

Conclusion TPM has more than a decade of R&D invested Participation by some of the IT industry s biggest players, from handheld to server Use cases include increased trust in the integrity of firmware/software stack and confidentiality of data Bare metal and virtual, client and server-side, including HSMs in the cloud and multilevel classified machines Hardware roots of trust are becoming ubiquitously available and cheap TPM is embedding hardware-enabled security from cheap consumer devices all the way to enterprise-grade datacenter infrastructure. 31

References TCG members: http://www.trustedcomputinggroup.org/members/ Mebromi paper from GMU.edu http://mason.gmu.edu/~msherif/isa564/fall11/projects/bios.pdf Google Five Year Identity Plan http://goo.gl/dflns NSA s High Assurance Platform (HAP) http://www.nsa.gov/ia/programs/h_a_p/resource_library/index.shtml NIST Special Publications SP 147, 155, 164 Windows TPM Provider - http://msdn.microsoft.com/enus/library/windows/desktop/aa376484(v=vs.85).aspx Windows TPM 2.0 Hardware Interface Table - http://download.microsoft.com/download/9/3/1/9310398b-2f4f-4e27- B57B-DFAA9723B6D5/tpm-2.0-hardware-interface-table.docx Windows Virtual SmartCards - http://download.microsoft.com/download/5/a/b/5abdded2-f56e-427d- 88C1-411EA0DBFF42/Understanding%20and%20Evaluating%20Virtual%20Smart %20Cards.docx Intel TXT graphic http://www.intel.com/content/www/us/en/architectureand-technology/intel-trusted-execution-technology-graphic.html ARM TrustZone virtual TPM http://www.arm.com/products/processors/technologies/trustzone.php 32

References SecureView Multi-Level Desktop with TPM: https://www.ncsi.com/nsatc11/presentations/thursday/real_world/dura nte.pdf (See slides 22, 25-26) Google Chromebook and TPM: http://www.chromium.org/developers/design-documents/tpm-usage AWS/SafeNet CloudHSM: http://aws.typepad.com/aws/2013/03/awscloud-hsm-secure-key-storage-and-cryptographic-operations.html PwC TPM Authentication Case Study: https://www.ncsi.com/nsatc11/presentations/tuesday/real_world/mural idharan.pdf NIST SP-800-164: http://csrc.nist.gov/publications/drafts/800-164/sp800_164_draft.pdf NSA High Assurance Platform (HAP): http://www.nsa.gov/ia/_files/hap_brochure.pdf 33