Peripheral Firmware Verification
Cryptographically verifying peripheral firmware integrity.
How it works
Peripherial firmware is collected and analyzed on a host either periodically or on demand. This information may be collected for future comparisons.
Changes in firmware hash values may indicate that the firmware has been tampered with or that firmware images are not maintained to current baselined versions, or even known vulnerable versions are deployed.
- Trust baselines will need to be generated for specific devices
- Changes to trusted configurations will need to be managed across the enterprise
The following references were used to develop the Peripheral Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)