Defense in Depth: Hardware Security

On the last Virtualization Security podcast, our guest was Robert Rounsavall, CEO of Trapezoid. Trapezoid is looking into how to alleviate supply chain security issues; in essence, the security of the hardware. At many a presentation, I have asked attendees, “Do you trust the hardware?” Many times the answer is that they do; at other times, it is that they do not. Whether you trust the hardware depends entirely on your thoughts with respect to hardware security. But what can you do about hardware security? What is the worst that can happen if the hardware is infiltrated?

Defense in Depth: The Worst

The worst that can happen, as we found out on the podcast, is that an attacker could hide malware that could shut down a network at the attackers’ whim, perhaps during critical actions. Or, the malware could copy data over a network for later decryption. In either case, there is a massive failure in hardware security due to the infiltration of  firmware, BIOS, and programmable hardware even from supposedly legitimate sources. Does everyone need to worry about these issues?

Perhaps!

Hardware is the basis for all computing. Hardware security, therefore, is the basis for all security. If the hardware has a weakness, then anything built upon it is weak—sort of like building a house on shifting sands.

But what can we do?

Defense in Depth: Hardware Security

Today there are a limited number things you can do to solve hardware security problems. The solutions consist of:

  • Verify the firmware checksum from a well-known hardware manufacturer source.
  • Verify that all new hardware has its firmware flashed with the well-known good firmware

However, this is not enough. TPM and TXT provide attestation for the operating system software: boot volumes and kernels. We need something to tell us about the hardware’s software: its firmware or BIOS.

Tools like SignaCert are designed to provide certified signatures against which we can measure firmware and software. SignaCert tries to exist as close to the supply chain as possible. However, this is neither continuous attestation nor boot attestation, as it is scheduled, usually when hardware arrives.

To provide proper hardware security, we need attestation on every boot of a bit of hardware, so that before we do any computing the device is verified. This problem is what Trapezoid is attempting to solve. They do this by making use of TPM and the Intel TXT extensions to store values into registers, so that hardware firmware attestation can occur on boot of a host. However, as infrequently as hosts reboot, sometimes we need to think of continuous attestation.

Continuous attestation would happen even after hardware is booted and would quarantine part of the system that does not meet security requirements, perhaps even powering the offending hardware off. Unfortunately, TPM and TXT currently do not support continuous attestation (even while the system is running).

The future is causing the hardware to attest itself while managing the checksums outside the hardware, which is the best we can do. We will need to trust the hardware registers inside TXT, as well as the external store of checksums.

Edward Haletky (352 Posts)

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Connect with Edward Haletky:

Tags: , , , , ,

One Response to Defense in Depth: Hardware Security

Leave a Reply

Your email address will not be published. Required fields are marked *

Please Share

Featured Solutions