Skip to content

Latest commit

 

History

History
14 lines (10 loc) · 668 Bytes

platform-security.md

File metadata and controls

14 lines (10 loc) · 668 Bytes

Platform Security

In order to design a secure platform, each and every component in the boot process must be measured and/or verified. In addition, the platform in its entirety must be modeled so that only desired operations are permitted.

There is one essential question: Who can execute code where and when?

  • when: which step/phase/stage in a boot flow chart (draw one)
  • where: which component (can be hardware parts and software layers)
  • who: owner, vendor, untrusted (w.r.t. owner) third party

Note: Third parties contracted by vendors are considered to be acting as controlled by the vendor here, regardless of practical issues with that.