Administrator Guide

Technical support and resources
ID 483
2.3 Current Threats
There are many threat vectors in the ever-changing IT landscape. Table 1 summarizes the Dell EMC
approach to managing critical backend threats.
Server Platform Layers
Security layer
Dell EMC solution
Physical server
Secured Component Verification (SCV), Chassis
Intrusion Detection
Firmware and software
Silicon-based Root of Trust; Intel Boot Guard;
AMD Secure Root of Trust; UEFI Secure Boot
Customization
Cryptographically signed and validated firmware;
CVE reporting; Patching as required
Attestation trust features
TPM, TXT, Chain of trust
Server management
iDRAC9; Remote attestation
Server Environment Layers
Security layer
Threat vector
Dell EMC solution
Data
Data breach
Self-Encrypting Drives (SED) FIPS or Opal/TCG
Secure Enterprise Key Management
ISE only (Instant Secure Erase) drives
Secure User Authentication
Supply Chain Integrity
Counterfeit components
Malware Threats
ISO9001 certification for all global server
manufacturing sites; Secured
Component Verification; proof of
possession
Security measures implemented as part of Secure
Development Lifecycle (SDL) process
Supply Chain Security
Physical security in Manufacturing sites
Theft and tempering during transport
Transported Asset Protection
Association (TAPA) facility security
requirements
Customs-Trade Partnership Against
Terrorism (C-TPAT); SCV