System Firmware Verification
Cryptographically verifying installed system firmware integrity.
How it works
Cryptographic hash values are computed for system firmware. The hash values are compared against precomputed firmware hash values to determine if the firmware has been tampered with.
When system firmware verification fails a set of predefined responses is typically invoked. The responses may direct the system to disable some devices or operations.
- Requires the use of system provided security modules
- Secure hash values will need to be computed for firmware
The following references were used to develop the System Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)