1 / 22

Secure Startup Hardware-Enhanced Security

Secure Startup Hardware-Enhanced Security. Stacy Stonich Program Manager Windows Security Microsoft Corporation. Peter Biddle Product Unit Manager Windows Security Microsoft Corporation.

velvet
Download Presentation

Secure Startup Hardware-Enhanced Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure StartupHardware-Enhanced Security Stacy Stonich Program Manager Windows Security Microsoft Corporation Peter Biddle Product Unit Manager Windows Security Microsoft Corporation

  2. A large multi-national company who wishes to remain anonymous told us that they lose an average of one corporate laptop per day in the taxicabs of just one US city…

  3. Session Outline • Problem: Easily Stolen Data • Current situation • Customer pain • Solution: Full Volume Encryption (FVE) • What it provides • The feature in action • Demo • Architectural Details • Value Add • Recovery Scenarios • Wrap up • Q & A

  4. Session Goals • Attendees should leave this session with: • A better understanding of Secure Startup • Knowledge of where to find resources for how to build platforms that support this feature • An understanding of how they can add hardware and software support to the feature

  5. Current Situation • Password recovery programs are widely available that enable offline attacks whichcan circumvent Windows XP datasecurity mechanisms • Offline attacks expose core system keys that allow for the compromise of secured data • Hundreds of thousands of laptops are lost every year

  6. Customer Pain • Difficult to protect the data on lost or stolen laptops • Corporate networks can be attacked via lost or stolen machines • User data stored on hard disk may be tampered with without a user knowing • User data from encrypted files may be disclosed to others during runtime • Compromise of users’ encrypted data can occur • Machine data cannot truly be erased

  7. Industry Data • “Dutch public prosecutor … was condemned yesterday for putting his old PC out with the trash. It contained sensitive information about criminal investigations in Amsterdam, and also his email address, credit card number, social security number and personal tax files.” – The Register, Oct 8, 2004 • “Hurried travelers have left as many as 62,000 mobiles, 2,900 laptops and 1,300 PDAs in London taxis over the past six months.” – BBC, August 2001 • “An estimated 11,300 laptop computers, 31,400 handheld computers and 200,000 mobile telephones were left in taxis around the world during the last six months … passengers had lost three times more handheld computers in the second half of 2004 than in 2001” – CNN, January 24, 2005

  8. Secure Startup • Technology providing higher security through use of Trusted Platform Module (TPM) • Addresses the lost or stolen laptop scenarios with TPM-rooted boot integrity and encryption • Provides secure system startup, full hard drive encryption, and TPM services • Attackers are stopped from using software tools to get at data Secure Startup gives you stronger security on your Windows codenamed “Longhorn” client systems, even when the system is in unauthorized hands or is running a different or exploiting OS. Secure Startup does this by preventing a thief who boots another OS or runs a hacking tool from breaking Longhorn file and system protections.

  9. Secure Startup BenefitsSecurity Timeline

  10. Disk Layout Encrypted OS Volume contains: Encrypted OS Encrypted page file Encrypted temp files Encrypted data Encrypted hibernation file MBR System Partition contains: Boot utilities (Unencrypted, ~50MB)

  11. Secure Startup ArchitectureStatic Root of Trust Measurement of early boot components

  12. Secure Startup ArchitectureStatic Root of Trust Measurement of BIOS

  13. Demo

  14. Full Volume Encryption Value Add • Encryption of the hibernation file protects against user allowing laptop to hibernate with sensitive docs open and then having the laptop stolen and docs at the fingertips of thieves • Full volume encryption enhances the security value of all registry, config files, paging files and hibernation files stored on the fully encrypted volume • Simply destroying the key allows for the safe disposal of corporate hardware/computer assets without fear of residual sensitive data

  15. Recovery Scenarios • Broken Hardware Recovery Scenario • User swaps the hard drive into a new machine because laptop screen is broken from a drop • Attack Detected Recovery Scenario • Virus makes modifications to the Boot loader • Recovery password (known by the user or retrieved from a repository by an administrator) • Recovery can occur ‘in the field’ • Windows operation continue as normal • Automated escrow of the keys and recovery passwords (i.e. to an AD) to allow for centralized storage and management of recovery mechanisms • Optionally, recovery keys can be written to media – such as a USB device

  16. Secure Startup Recovery

  17. Requirements • Hardware requirements to support Secure Startup • Trusted Platform Module (TPM) v1.2 • Provides platform integrity measurement and reporting • Requires platform support for TPM Interface (TIS) • See www.trustedcomputinggroup.org • Firmware (Conventional or EFI BIOS) – TCG compliant • Establishes chain of trust for pre-OS boot • Must support TCG specified Static Root Trust Measurement (SRTM) • See www.trustedcomputinggroup.org

  18. Call to Action • Firmware • Make sure INT 1A Subfunction BBh calls behave correctly as documented by TCG (Trusted Computing Group) - even if no TPM • Hardware • Make sure Secure Startup works with TPM 1.2's • Disk utilities • TPM not required to test Secure Startup for application compatibility. Work with MS to make encrypted volumes work with low level utilities

  19. Community Resources • Windows Hardware & Driver Central (WHDC) • www.microsoft.com/whdc/default.mspx • Technical Communities • www.microsoft.com/communities/products/default.mspx • Non-Microsoft Community Sites • www.microsoft.com/communities/related/default.mspx • Microsoft Public Newsgroups • www.microsoft.com/communities/newsgroups • Technical Chats and Webcasts • www.microsoft.com/communities/chats/default.mspx • www.microsoft.com/webcasts • Microsoft Blogs • www.microsoft.com/communities/blogs

  20. Additional Resources • Web Resources • Whitepapers • Related Sessions • How to Build Hardware Support for Secure Startup • Non-Microsoft Community Sites • www.trustedcomputinggroup.org • Questions? Send mail to sstartup@microsoft.com

  21. © 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related