By John Yeoh, Research Director/Americas, Cloud Security Alliance
As valued members, we wanted you to be among the first to hear about the newest report out from CSA—Firmware Integrity in the Cloud Data Center, in which key cloud providers and datacenter development stakeholders share their thoughts on building cloud infrastructure using secure servers that enable customers to trust the cloud providers’ infrastructure at the hardware/firmware level.
Authored by the Cloud Security Industry Summit (CSIS) Technical Working Group, the position paper is aimed at hardware and firmware manufacturers, and identifies gaps in the industry, which make it difficult to meet the recently published NIST 800-193 requirements with ‘standard’ general-purpose servers and offers ways in which to build servers designed to meet the NIST requirements (including calling out missing technology when applicable) and enable cloud providers to increase trust in commodity hardware. The paper also suggests additional requirements that could further strengthen the level of security of servers.
Among the gaps that CSIS singles out for immediate attention by hardware manufacturers are:
- First-instruction integrity – The ability to ensure integrity of the first instruction (the first code or data loaded from mutable non-volatile media) in a way that is verifiable by the cloud provider and not just by the manufacturer.
- Chain-of-Trust for peripherals – The ability to leverage the host root of trust and other roots of trust to create a chain of trust to peripherals (e.g. for PCIe devices or other symbiont devices).
- Automatable Recovery – The ability to perform automated recovery back to a known boot-time state upon detection of corrupted firmware (after initial boot).
With the increasing level of sophistication of attackers and nation state threat mitigations, we think it’s critical to build a new, more secure generation of servers. The hardware/firmware industry must do a better job of building firmware with high code-quality and minimal potential for vulnerabilities at the firmware level. It’s vital that supply chain security can be verified every step along the way from component to system to solution The CSIS’s opinion is that these requirements can be met without cloud vendors having to design and build specialized hardware but rather through standardized commodity hardware.
We hope you will find this informative and that it will lead to further discussions within your own organization about the challenges involved in the future of cloud security.