Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot



Similar documents
BitLocker Network Unlock & BitLocker support for Encrypted Drives

UEFI Implications for Windows Server

Trustworthy Computing

LinuxCon Europe UEFI Mini-Summit 7 October 2015

Strategies for Firmware Support of Self-Encrypting Drives

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

UEFI Firmware Security Best Practices

UNCLASSIFIED Version 1.0 May 2012

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Hi and welcome to the Microsoft Virtual Academy and

The UEFI Security Response Team (USRT)

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Control your corner of the cloud.

Session ID: Session Classification:

Patterns for Secure Boot and Secure Storage in Computer Systems

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

Technical Brief Distributed Trusted Computing

Windows 7, Enterprise Desktop Support Technician

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Windows Phone 8 Security Overview

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Windows Server Virtualization & The Windows Hypervisor

BlackBerry 10.3 Work and Personal Corporate

DELL. Unified Server Configurator Security Overview. A Dell Technical White Paper. By Raja Tamilarasan, Wayne Liles, Marshal Savage and Weijia Zhang

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Lecture Overview. INF3510 Information Security Spring Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure

Start building a trusted environment now... (before it s too late) IT Decision Makers

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

MBAM Self-Help Portals

Secure Data Management in Trusted Computing

Trusted Virtual Datacenter Radically simplified security management

One-Stop Intel TXT Activation Guide

70-685: Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician

Attacking Hypervisors via Firmware and Hardware

Software Execution Protection in the Cloud

Operating System Security

Managing Enterprise Devices and Apps using System Center Configuration Manager

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Microsoft s Advantages and Goals for Hyper-V for Server 2016

Penetration Testing Windows Vista TM BitLocker TM

SafeGuard Enterprise 6.10 Peter Skondro

UEFI on Dell BizClient Platforms

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Windows Phone 8 Security deep dive

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

Symantec Backup Exec Blueprints

Guidance End User Devices Security Guidance: Apple OS X 10.9

Virtualization System Security

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile.

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

installing UEFi-based Microsoft Windows Vista SP1 (x64) on HP EliteBook and Compaq Notebook PCs

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

managing the risks of virtualization

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

Embedded Trusted Computing on ARM-based systems

Introduction to BitLocker FVE

A White Paper By: Dr. Gaurav Banga SVP, Engineering & CTO, Phoenix Technologies. Bridging BIOS to UEFI

Dell Client BIOS: Signed Firmware Update

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

DELL. Unified Server Configurator: IT and Systems Management Overview. A Dell Technical White Paper

Computer Security: Principles and Practice

Implementing and Managing Windows Server 2008 Hyper-V

Security Considerations in Cloud Deployments Matthew Garrett

Locking down a Hitachi ID Suite server

vsphere Security ESXi 5.5 vcenter Server 5.5 EN

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

ICT Professional Optional Programmes

Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List

Encrypting with BitLocker for disk volumes under Windows 7

Windows Server 2008 R2 Hyper V. Public FAQ

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Index. BIOS rootkit, 119 Broad network access, 107

Disk Encryption. Aaron Howard IT Security Office

One-Stop Intel TXT Activation Guide

Virtual Machine Security

DriveLock and Windows 7

9/26/2011. What is Virtualization? What are the different types of virtualization.

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Transcription:

presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org 1

Agenda Introduction otpm odevice Guard and HVCI osecure Boot ofew other important things Q&A UEFI Plugfest May 2015 www.uefi.org 2

TPM (Trusted Platform Module) UEFI Plugfest May 2015 www.uefi.org 3

TPM New features enabled by a properly configured TPM Windows Hello (Passwordless, secure, login) Remote Health Attestation Virtual Smart Card UEFI Plugfest May 2015 www.uefi.org 4

TPM TPM 2.0 Required on Mobile at RTM Required on Client if either: Silicon on device has ftpm support. 365 days have elapsed since RTM of Win10. HLK Tests available Important Notes Regarding Client Clients may ship with more than one TPM. Windows only supports one TPM. When more than one TPM is available a toggle is needed. Warn user that they should disable Bitlocker before changing TPMs and that they will lose any stored keys. Correct TPM PCR value measurement and validation are critical. UEFI Plugfest May 2015 www.uefi.org 5

TPM HMAC Commands are needed Essential for new features such as Windows Passport/Hello TPM Must be able to be disabled. See Min HW Requirement for specific procedure to follow to ensure TPM is fully disabled. These new requirements set up Windows to be a highly secure by default platform, providing high security scenarios out of the box. UEFI Plugfest May 2015 www.uefi.org 6

Device Guard and HVCI UEFI Plugfest May 2015 www.uefi.org 7

Device Guard Overview The Parts of the solution Hardware security Configurable code integrity Virtualization based security Protects critical parts of the OS against admin/kernel level malware Manageability via GP, MDM, or PowerShell UEFI Plugfest May 2015 www.uefi.org 8

Virtualization Based Security Provides a new trust boundary for system software Leverage platform virtualization to enhance platform security Limit access to high-value security assets from supervisor mode (CPL0) code Provides a secure execution environment to enable: Protected storage and management of platform security assets Enhanced OS protection against attacks (including attacks from kernelmode) A basis for strengthening protections of guest VM secrets from the host OS Windows 10 services protected with virtualization based security LSA Credential Isolation vtpm (server only) Kernel Mode Code Integrity (HVCI) UEFI Plugfest May 2015 www.uefi.org 9

KMCI in Windows 8.1 Host OS Normal World Howdy Peer! User Kerne l KMCI Malware Firmware (UEFI) Hardware (TPM 2.0, Vt-x2, IOMMU)

Measured KMCI with Windows 10 VBS Host OS Secure World Normal World I thought we could be friends User Kernel KMCI Hardened Boundary Malware Hypervisor Firmware (UEFI) Hardware (TPM 2.0, Vt-x2, IOMMU)

HVCI CI rules are still enforced even if a vulnerability allows unauthorized kernel mode memory access Memory pages are only marked executable if CI validation succeeds Kernel memory cannot be marked both writable and executable BUT impacts Driver compatibility UEFI Runtime services compatibility UEFI Plugfest May 2015 www.uefi.org 12

Hardware Security This means the users physically in possession of a machine cannot easily modify it Includes: Platform Secure Boot Secure Firmware Updates Locking the BIOS menus Restricting Boot options UEFI Plugfest May 2015 www.uefi.org 13

Device Guard and HVCI Ready Devices Virtualization extensions ON by default UEFI Runtime services compatible with HVCI BIOS locked down against Physical attacker Boot options Secure Boot Secure Firmware Updates UEFI Plugfest May 2015 www.uefi.org 14

Secure Boot UEFI Plugfest May 2015 www.uefi.org 15

Secure Boot HSTI Required for Win10 (Mobile SKU and CS) Specification published on msdn HLK test available Microsoft UEFI CA - Required for Win10 DBX must ship upto date HLK test for default DBX available UEFI Plugfest May 2015 www.uefi.org 16

HSTI HSTI is a Hardware Security Testability Interface Required by System.Fundamentals.Firmware.CS.UEFISecureBoot.Provisioning On MSDN here: https://msdn.microsoft.com/enus/library/windows/hardware/dn879006.aspx HSTI is an interface to report the results of security-related self-tests. IHVs provide the definition of the reporting fields. Each reporting entity is responsible for full analysis and testing of their own components. HSTI is for providing high assurance validation of proper security configuration as systems leave the line. This reduces support load for IBVs, decreases debug time for OEMs and increases consumer confidence in properly configured machines. UEFI Plugfest May 2015 www.uefi.org 17

Microsoft UEFI CA signing service Policy details: msdn link 1. No organization only, OEM only, internal tools only products only 3 rd party products that supported to be run on all UEFI machines in the world 2. RTM product only 3. No products that would possibly bypass Secure Boot, hence the need for detailed security review and resulting turn around time NOTE: Brainstorm and discussion session UEFI Plugfest May 2015 www.uefi.org 18

Few other important things UEFI Plugfest May 2015 www.uefi.org 19

Remote Attestation Remote Attestation: is part of New Host Guardian Service Windows Server Role Validate host identity & host configuration Issue Attestation Certificate to a validated host Host Validation: Host Identity validation: Known good TPM s EKpub Host Configuration validation: Known good TPM measurements Consistent TCG log Known good HVCI policy hash Host UEFI validation: Known good DB & DBX UEFI Plugfest May 2015 www.uefi.org 20

Remote Attestation - UEFI Requirements Windows 10 Server Assurance AQ requirements: TPM 2.0 Mandatory: TPM 2.0 is required Mandatory: TPM Functionality required as specified in System.Fundamentals.TPM20 requirements for Windows 10 Mandatory: An automated tool is provided to clear TPMs remotely on an arbitrary number of managed machines. Optional: PPI clear settings may be chosen by the OEM. Optional: An automated tool is provided to toggle PPI status remotely on an arbitrary number of managed machines. UEFI Secure Boot Mandatory: Secure Boot requirements as specified in System.Fundamentals.Firmware.UEFISecureBoot for Windows 10. Mandatory: Secure Boot is shipped enabled or an automated tool is provided to enable Secure Boot remotely managing arbitrary number of machines. UEFI Plugfest May 2015 www.uefi.org 21

Recommendations on UEFI 2.5 updates 1. Mantis 1224: Physical Memory Protection attribute (MemoryProtectionAttribute) Needed for HVCI on Windows 10. 2. Mantis 1227: Platform Recovery Recommended to not implement this until atleast one OS adopts. Windows 10 doesn t have a support for this and hopeful to have support in the next OS release 3. Mantis 1263: Customized Deployment of Secure Boot Recommended to not implement this until atleast one OS adopts. Windows 10 doesn t have a support for this and hopeful to have support in the next OS release UEFI Plugfest May 2015 www.uefi.org 22

Firmware Update through WU Open to all OEMs UEFI Plugfest 2014 presentation: Leveraging Windows Update to Distribute Firmware www.uefi.org/sites/default/files/resources/2014_uefi_plugfest_07... MSDN documentation: http://www.microsoft.com/en-us/download/details.aspx?id=38405 Interested? Follow-up with david.edfeldt@microsoft.com and Dave.Roth@microsoft.com> UEFI Plugfest May 2015 www.uefi.org 23

Q & A UEFI Plugfest May 2015 www.uefi.org 24

Thanks for attending the UEFI Spring Plugfest 2015 For more information on the Unified EFI Forum and UEFI Specifications, visit http://www.uefi.org presented by UEFI Plugfest May 2015 www.uefi.org 25