HP Sure Start for AMD Technical whitepaper

July 2019
L75214-001
HP Sure Start for AMD
© Copyright 2019 HP Development Company, L.P.
5 Appendix ANIST SP 800-193: Platform Firmware Resiliency Guidelines 17
POST Power-On Self-Test
RoT Root of Trust (defined in NIST SP 800-193)
RTD Root of Trust for Detection (defined in NIST SP 800-193)
RTRec Root of Trust for Recovery (defined in NIST SP 800-193)
SMM System Management Mode
UEFI Unified Extensible Firmware Interface
Table 3 Required functions for Host Processor Boot Firmware
The table below provides a summary of each function described by NIST SP 800-193.
NIST SP 800-193 HP Sure Start
Roots of Trust
(Section 4.1)
Meets all
Resiliency
Requirements
HP Sure Start for AMD uses a hardware-based RoT (the HP ESC) with immutable
boot firmware, which cryptographically verifies subsequent firmware before
launching it, creating a Chain of Trust.
HP Sure Start for AMD includes a key store and approved digital signing
algorithms based on FIPS 186-4 to verify the digital signature of firmware update
images.
HP Sure Start for AMD uses authenticated update, detection, and recovery
mechanisms, which are anchored in ’s HW-based RoT.
Protection and
Update of Mutable
Code (Section 4.2.1)
Meets all
Resiliency
Requirements
HP Sure Start for AMD uses an authenticated update mechanism anchored in HP
Sure Start for AMD ’s HW-based RoT.
Firmware update images are digitally signed by HP’s code signing service (HP
Secure Sign) and verified prior to updating.
HP Sure Start for AMD integrity protects the HP ESC and UEFI flash regions, so
that only its authenticated update mechanism or a secure local update through
physical presence can modify those flash regions.
HP Sure Start for AMD has no known authenticated update bypass mechanisms
and contains the ability to prevent rollback to earlier authentic firmware images
with known security vulnerabilities.
Protection of
Immutable Code
(Section 4.2.2)
Meets all
Resiliency
Requirements
HP Sure Start for AMD uses a hardware-based RoT (the HP ESC) with immutable
boot firmware.
Runtime Protection
of Critical Platform
FW (Section 4.2.3)
Meets all
Resiliency
Requirements
Critical Platform Firmware executing in volatile storage (RAM) runs and:
ceases its operation prior to the loading of system software. That is, it runs
during POST and stops before the OS is loaded.
is protected from system software using SMM protections enforced by the
CPU