Using the TPM to Solve Today s Most Urgent Cybersecurity Problems



Similar documents
Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Embedded Trusted Computing on ARM-based systems

Trustworthy Computing

Dell Client BIOS: Signed Firmware Update

Property Based TPM Virtualization

Index. BIOS rootkit, 119 Broad network access, 107

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

Acronym Term Description

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Patterns for Secure Boot and Secure Storage in Computer Systems

SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB

Desktop Virtualization. The back-end

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

vtpm: Virtualizing the Trusted Platform Module

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Cisco Trust Anchor Technologies

Software Execution Protection in the Cloud

Building Blocks Towards a Trustworthy NFV Infrastructure

Embedded Java & Secure Element for high security in IoT systems

Lecture Overview. INF3510 Information Security Spring Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure

Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot

UNCLASSIFIED Version 1.0 May 2012

Software Token Security & Provisioning: Innovation Galore!

Hi and welcome to the Microsoft Virtual Academy and

Penetration Testing Windows Vista TM BitLocker TM

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Threat Model for Software Reconfigurable Communications Systems

SecureDoc Disk Encryption Cryptographic Engine

On the security of Virtual Machine migration and related topics

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Hierarchies. Three Persistent Hierarchies. Chapter 9

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Windows Phone 8 Security Overview

Session ID: Session Classification:

Attacking Hypervisors via Firmware and Hardware

Certification Report

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

CSE543 Computer and Network Security Module: Cloud Computing

Secure Network Communications FIPS Non Proprietary Security Policy

Enterprise Cybersecurity: Building an Effective Defense

Control your corner of the cloud.

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

End to End Security do Endpoint ao Datacenter

Technical Brief Distributed Trusted Computing

TPM Key Backup and Recovery. For Trusted Platforms

Software-based TPM Emulator for Linux

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

A Perspective on the Evolution of Mobile Platform Security Architectures

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

McAfee Firewall Enterprise 8.2.1

SkySecure System Overview

Post-Access Cyber Defense

IoT Security Concerns and Renesas Synergy Solutions

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Hardware Enabled Zero Day Protection

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone

CRYPTOGRAPHY AS A SERVICE

ipad in Business Security

The Impact of Cryptography on Platform Security

FileCloud Security FAQ

Smart Card APDU Analysis

The Value of Physical Memory for Incident Response

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Securing Virtual Applications and Servers

M-Shield mobile security technology

Analysis of advanced issues in mobile security in android operating system

MySQL Security: Best Practices

Certification Report

Data Center Connector for vsphere 3.0.0

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Data Protection: From PKI to Virtualization & Cloud

That Point of Sale is a PoS

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications

Start building a trusted environment now... (before it s too late) IT Decision Makers

Locking down a Hitachi ID Suite server

Security Policy for FIPS Validation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Securing the Intelligent Network

Virtual Machine Security

USB Portable Storage Device: Security Problem Definition Summary

Guidance Regarding Skype and Other P2P VoIP Solutions

Full Drive Encryption Security Problem Definition - Encryption Engine

Mobile Platform Security Architectures A perspective on their evolution

Transcription:

Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, 2014 10:00AM PDT

2

Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development) for Cisco and a member of the Trusted Computing Group's Embedded Systems Work Group. He also serves as the primary board member representing Cisco. Stacy has worked in the field of trusted computing for a number of years. As a subject matter expert in trusted computing, his responsibilities require an in-depth understanding of the trusted computing market, including advances in hardware and software security as well as vendor and customer market dynamics. Monty Wiseman, Security Architect, Intel Corporation Monty is a Security Architect for Intel's Data Center Group (DCG). His current projects include architecture for TCG, Intel's TXT(R) Technologies, Boot Guard(R) and other security initiatives. Monty has participated (for chair of) the TCG PC Client working group, Security Evaluation working group and is Intel's representative in the TCG Technical Committee. Monty has 20 years experience in Desktop, Network and Mainframe environments holding security related and other engineering positions at Novell, Fujitsu, and Control Data. Monty has been developing hardware and software for computers ranging from mainframe to microcomputers since 1975. 3

4

and Core Root of Trust for Measurement (CRTM) measure BIOS at boot Measurements are internally verified If a mismatch is found, the offending module is rolled back to the Last Known Good Then boot continues 1. Power on 2. CRTM measures BIOS 3. Measurements match expectations 4. Execute BIOS and boot 3. Mismatch found 3.5 Rollback bad module to last known good copy 5

UEFI Boot 1 Win 8 OS Loader Windows Kernel 2 Boot Policy AM Policy ELAM Software 3rd Party Software 3 4 1 2 3 4 Secure boot prevents running an unknown OS loader ELAM starts first and enforces its policy Boot measurements were recorded during boot Signed boot measurements can be sent to an off-box service for analysis Slide duplicated from Microsoft //build presentation September 2011 Windows Logon Anti- Malware Client Quote Healthy? Attestation Service

Receiver for XC Network Isolation VPN Isolation VPN Isolation VPN Isolation AFRL s SecureView 1.2 Architecture XenClient XenClient XT Unique Control Domain Service VMs TS VM S VM Confid ential VM ESPN The integrity of blue components is validated Intel HW and the SELinux SELinux SELinux SE Linux SE Linux SE Linux Policy Granularity Xen Client XT Xen Security Modules Policy Granularity Policy Granularity Policy Granularity Intel vpro Hardware VT-d VT-x TXT AES-NI Mouse/ Keyboard Intel TXT/ nvidia GPU Intel Integrated GPU UNCLASSIFIED 2013-2014 Cisco and/or its affiliates. All rights reserved. 7

Applying the SecureView Model to Cloud Servers SecureView uses Intel TXT and the to validate BIOS and the Hypervisor at start You always know you started a trusted Hypervisor and all of its services If one of those services continuously validates runtime integrity, you know the hypervisor remains trusted If VMs are also integrity checked at start, then the VM is also trusted Same deal if one of the services in a VM validates runtime integrity, you know the VM remains trusted Defense against zero-day attack: Integrity validation is focused only on detecting ANY uncontrolled change not any specific change 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

VM VM VM Integrity of VM measured at start and runtime integrity validated as for hypervisor Hypervisor Intel HW with TXT and Runtime integrity validated by Trapezoid or the like TXT and validate integrity of Hypervisor

VM VM VM Runtime integrity validation monitors uncontrolled changes to processes in execution any change is seen, therefore we have (limited) Zero-Day defense Hypervisor Intel HW with TXT and Continuous integrity validation gives no insight into the nature of the change. Operationally, that is generally unimportant. The rapid discovery that uncontrolled change occurred, IS important. The HW is mostly out of the loop during

GPU includes a Central ICS console Unknown operator Design: Authentication protocol enhanced to require Certificate exchange Integrity report exchange At session start, each side Signs a nonce and their integrity report using a HW protected key Validates the provided report No match, no session No session, no hack No key and no valid integrity report 11

12

BIOS resides in privileged space: Invisible to Anti-Virus SW Malware in BIOS is persistent : Does not go away by rebooting or reinstalling the OS CIH/Chernobyl 1998 killed between 1M and 2M machines Increase in security research John Heasman Rootkit in BIOS via ACPI - 2007 Hijacked ACPI to inject Rootkit into system BIOS Sherry Sparks SMM rootkit with covert packet exfiltration 2008 Undetectable Key Logger Alfredo Ortega/Anibal Sacco persistent BIOS attack 2009 flash malicious BIOS onto system NIST SP 800-155 Butterworth/Kallenberg/Herzog/Kovah Problems with the Static Root of Trust for Measurement 2013 51 byte patch to SCRTM to subvert measurements Bulygin/Furtak/Bazhaniuk 2013 A Tale of One Software Bypass of Windows 8 Secure Boot http://csrc.nist.gov/publications/drafts/800-155/draft-sp800-155_dec2011.pdf BIOS Flashing Trojan in the wild Trojan.Mebromi Sept 2011 Research is a leading indicator of future exploits. Secure boot bypass provides motivation.

14

Outside World s view of the Component. FW Component Mutable Components e.g., Firmware, software, configuration settings HW Component Immutable Components i.e., hardware 15

Version? Version? Version? V_1 V_2 V_2 FW/SW Component V1 FW/SW Component V2 FW/SW Component V1 (Attacked) HW Component HW Component HW Component 16

Outside World s view of a Trusted Component. FW Component Mutable Components e.g., Firmware, software, configuration settings Root HW Component Immutable Components i.e., hardware 17

Glossary: A component that performs one or more security-specific functions, such as measurement, storage, reporting, verification, and/or update. It is trusted always to behave in the expected manner, because its misbehavior cannot be detected under normal operation. Explanation: Must begin by trusting a set of components to perform necessary functions to support Trusted Computing in the expected manner. Misbehavior of these components is not detectable by the evidence and protocols provided by Trusted Computing. For example: A root fails to properly initialize a platform and measurements begin incorrectly. While this misbehavior might be detectable by physical inspection (e.g., in a lab) this misbehavior cannot be detected using Trusted Computing methods (i.e., attestation).

Shielded Locations location on a that contains data that is shielded from access by any entity other than the and which may be operated on only by a Protected Capability Defined Interface Protected Capabilities operation performed by the on data in a Shielded Location in response to a command sent to the Protected Capabilities Commands object Shielded Locations Instantiating Environment 19

Verified Boot: Boot policies are enforced during the boot process. Starting with the Root of Trust for Verification the currently executing module verifies the next module against a policy (i.e., manifest). Measured Boot: Integrity Measurement are placed into the. Starting with the Root of Trust for Measurement the currently executing module places the Integrity Measurement of the next module into the. Secure Boot: A boot process which implements either Verified Boot or Measured Boot or both.. Clarification: Verified Boot is often referred to as Secure Boot. Measured Boot is often referred to as Trusted Boot. Verified Boot (i.e., Secure Boot), however, only provides assurance that the boot policy was enforced and does not provide any assurance or evidence that the components are secure. Therefore, the moniker secure in this context is misleading.

Unsecured Boot Reset Assumption Execute Assumption Execute Assumption OS/ Apps Measured Boot Reset Verifies against Manifest during / after boot. Local Attestation: Enforces Policy Remote Attestation: Key signs measurements. IT Verifies against manifest Execute Measure Execute Measure OS/ Apps Verified Boot Reset Policy applied starting here IT Has no proof of Execute Verify Execute Verify OS/ Apps proper boot 21

Proof of a Device s Identity Proof (e.g., Authentication) of a platform s identity adds a cryptographic binding between the platform and a key Proof of a Device s [boot-time] Integrity Proof of the identity of the platform s firmware, software components and configuration Reset Boot Firmware Optional Components OS

Integrity Measurement Measurement At Reset PCR := 0 PCR := hash{ [PCR] Integrity Metric } Recorded metrics of the platform s characteristics Typically done using a series of cryptographic recordings At Reset PCR[X]:=0 then Boot Firmware Optional Components OS PCR[X] = hash{pcr[x] Integrity Metric of component 1} then PCR[X] = hash{pcr[x] Integrity Metric of next component}, etc. Roots Elements which must be trusted Misbehavior is not detectable Objective: Keep these small 23

24

A cohesive set of measurement started by RTM Provides an audit of boot sequence BIOS Option ROM OS Loader Measurement 25

Maps the BIOS components to PCRs E.g., PC Client Specification for UEFI BIOS Option ROM OS Loader PCR[0] PCR[2] PCR[4] 26

j j Commands Commands T P M o b e c t Other Functions Commands T P M o b e c t Other Functions object IP block IP block Discrete IP block (a chip) Integrated IP block Separate HW Domain 27

object Commands Apps OS Apps OS VM VM VM VMM Separate Virtual Domains 28

Applications TSS TDDL Byte Stream TSS RTM (e.g., ROM, BIOS Boot Block) (e.g., discrete chip, integrated IP Block) Boot FW (e.g., BIOS) Platform OS Driver PTP Defined Interface PTP Defined Internal Resources Device Driver Writers Guide Platform Profile (e.g., PC Client PTP, aka: TIS) Platform Specific Firmware Specifications (e.g., PC Client Firmware Specification for UEFI) X.X Family Functions Byte Stream 2.0 Library 29

Applications General Interfaces and code TSS Feature / Environmental API Linux Keyring Java classes: cypto / keyring PKCS#11 OS or Application Specific Key Managers TSS Expert-level Interfaces and code TDDL Driver PTP Defined Interface PTP Defined Internal Resources X.X Family Functions 30

31

Usage Description Problem Solution Device Attestation (Remote Attestation) IT wants data is sent only to authorized device. Assume user only executes authorized FW and OS. Prevent sending data to unauthorized devices. Need to determine the authenticity of an endpoint s claimed identity when: Device is outside IT s physical control Connected via untrusted connection Protect key authenticating device using a key Use a signing key with Properties: Non-duplicateable HMAC authorization Assume FW and OS installed by user will protect assets at runtime Device & Software Attestation (Remote Attestation) IT wants data is sent only to authorized device. Do not assume user only executes authorized FW and OS. Enforce authorized FW and OS was executed before sending data. Above + Enforce device executing authorized firmware / OS. Use a signing key with Properties: Above + PCR Policy Enforce FW and OS installed by user to protect assets at runtime Device Asset Protection (Local Attestation) Device lost or stolen. Attacker can mount and read device s media. Assume device executes only authorized FW and OS which provides runtime asset protection. Protect data from access when in the physical possession of attacker. Protect data with key but attacker can break user s low entry PIN protecting key using offline methods. Users will not use high-entropy PINs. Protect device encryption key using a key Use a signing key with Properties: Duplicateable (For recovery) HMAC authorization s anti-dictionary attack mechanisms allow low-entropy, user-friendly(er) PINs Assume device executes only authorized FW and OS which provides runtime protection of key. Note: Above protections come into play when attacker attempts to reboot device. Runtime protections are provided by OS. Device & Software Asset Protection (Local Attestation) Device lost or stolen. Attacker can mount and read device s media. Enforce device executes only authorized FW and OS which provides runtime asset protection. Above + Enforce device executes only authorized FW and OS which provides runtime asset protection. Protect device encryption key using a key Use a signing key with Properties: Above + PCR Policy Note: As above, but now PCR Policy enforces FW and OS. 32

Device Manufacturer Retail Store e.g., per NIST 800-155 IT gets /Platform Certificates IT gets list of reference PCR values for authorized FW / OS IT Ship Device Sell Device Employee Employee sends device attestation Key{ PCR[] } Employee gets list of IT authorized devices IT requests signed PCR values IT verifies device is from authorized Manufacturer generate media encryption key w/pcr values above IT verifies PCR values against manifest provided by Manufacturer CertifyingKey{ Enc Key properties } IT verifies encryption key meets policies. Now sends data to device 2014-05-19 33

34

An open, defined set of building block protocols providing platform-level attestation and storage protections Discussed previously Flexible set of Policies Policies are applied to objects when they are created Many policies types supported Can combine with AND and OR operations Algorithm Agility Protocols provide selectable (at implementation or use time) algorithms Symmetric keys (DEC, AES, etc.) Asymmetric keys (RSA, ECC, etc.) Hash algorithms (SHA-1, SHA-256, SHA-384, etc.) Enhanced Provisioning Separation of assets for the platform and user 35

Examples Password: Simple and in the clear used for trusted environments HMAC: A shared key using HMAC to protect secret in transit PCR: Platform must match expected configuration (measured firmware and software) Time: Can restrict a key to be used only for a certain period of time Count: Can restrict a key to be used only one time (or a set number) Signed: Verifies a signature from an external private key (e.g., SmartCard) ANDs and ORs This allows stronger two factor authorization (i.e., authorization is: Using the authorized device () AND have possession of the SmartCard + PIN. Can create a policy such as: (PCR) AND (Secret) : Normal user access protected data. Only authorized if authorized software and user are present OR (Signed) : An IT admin uses a SmartCard (even remotely) in case user forgets Secret 36

2 s library structures are not hard-coded to a particular algorithm may support more than one Protocols provide fields for selecting algorithms for each function vendor implement selected algorithms Platform Profile specifies minimum sets of algorithms Structure type Algorithm Type Crypto Data vendor may implement more than minimum set Supports types such as Symmetric keys (DEC, AES, etc.) Asymmetric keys (RSA, ECC, etc.) Hash algorithms (SHA-1, SHA-256, SHA-384, etc.) Extensible TCG Registry published identifying each TCG enumerated algorithm 37

Platform Hierarchy Storage Hierarchy Endorsement Hierarchy Platform Assets User Assets for signing and storage User Assets for Attestation Independent Controls for each hierarchy 38

Post your question now. 39

2.0 Library Specification: http://www.trustedcomputinggroup.org/resources/tpm_library_specification Infographic - Protect Your Data and Enhance Security: http://www.trustedcomputinggroup.org/resources/protect_your_data_and_enhanc e_security SANS Institute: Implementing Hardware Roots of Trust White Paper & Webcast: http://www.trustedcomputinggroup.org/resources/implementing_hardware_roots_ of_trust Root of Trust: Foundation for IT Security Article: http://www.trustedcomputinggroup.org/resources/root_of_trust_foundation_for_it_ security Become a TCG Member Join Now!: http://www.trustedcomputinggroup.org/join_now/membership_benefits 40