PowerPoint Secure-Core Server 2022 Technology

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

Server 2022

Technology
Review
Secure-core
Servers
Windows Server 2022 Technology

2
Information Technology Ecosystem is
constantly moving forward
• SNIA Storage Networking Industry Association
• IETF Internet Engineering Task Force
• IEEE Institute of Electrical and Electronics Engineers
• Linux Foundation
• DTMF Distributed Management Task Force
• W3C World Wide Web Consortium (W3C)
• OASIS Standard Generalized Markup Language (SGML)

3
Secure-core
servers
• Certified OEM hardware
for Secured-core server

4
Intel secure-core server motherboard

5
Firmware Attack
Surface Reduction
(FASR)

• Firmware is becoming an
attractive attack vector due to
firmware running in Ring –2
• Outside the scope of the
operating system
• Most vendors are using S-RTM

6
Intel CPU design
• Ring 0: Kernel (Highest Privilege)
• Ring 1: Virtual Box's Guest Kernel
• Ring 2: Unused
• Ring 3: Windows' User Mode

7
Negative Ring
• Ring -1: Hypervisor
• Ring 0: Kernel (Highest Privilege)
• Ring 1: Virtual Box's Guest Kernel
• Ring 2: unused
• Ring 3: User Applications (Lowest
Privilege)

8
Negative Rings
• Ring -3: Management Engine (ME)
{Highest Privilege}
• Ring -2: System Management Mode
(SMM)
Negative Rings
• Silicon
• Microcode
• Ring -3: Management Engine (ME) {Highest
Privilege}
• Ring -2: System Management Mode (SMM)
• Ring -1: Hypervisor
• Ring 0: Kernel (Highest Privilege)
• Ring 1: Device Drivers
• Ring 2: Device Drivers
• Ring 3: User Applications (Lowest Privilege)

10
Security from chip to cloud

11
S-RTM early method of protecting the boot process

A Static Root of Trust for


Measurement (S-RTM) If trust is compromised at
establishes trust at system any point in the boot
reset and requires that trust process, it is irrecoverable
be maintained throughout until system reset.
the entire boot process.
S-RTM:
problem
• As there are thousands of PC
vendors that produce many
models with different UEFI BIOS
versions, there becomes an
incredibly large number of SRTM
measurements upon bootup.
• Time to move to D-RTM

13
Dynamic Root of Trust for
Measurement (DRTM)

• Windows Defender System Guard Secure


Launch leverages Dynamic Root of Trust
for Measurement (DRTM).
• As Windows 10/11/Server 2016-2019-2022 boots, a
series of integrity measurements are taken by
Windows Defender System Guard using the device’s
Trusted Platform Module 2.0 (TPM 2.0)

14
Protects both boot and runtime firmware code

• After the system


boots, Windows
Defender System
Guard signs and
seals these
measurements
using the TPM
• All of this security
technology is now
under "Windows
Secure Boot"

15
What is the requirement for secure-core?

• A secure supply chain for OEM manufacture's chips and components


• TPM 2.0: Hardware root-of-trust
• Secure Boot with D-RTM
• System Guard with Kernel Direct Memory Access (DMA) protection
• Kernel DMA protection uses the Input/Output Memory Management
Unit (IOMMU)
• Virtualization-based security (VBS)
• Hypervisor-based code integrity (HVCI)

16
system requirements:

• x64 CPU
• SLAT or Second Level Address Translation
• Intel VT-D or AMD-Vi
• Trusted Platform Module 2.0
• SMM protection supported firmware
• UEFI memory reporting
• Security MOR 2 (Memory Overwrite Request)
• HVCI or Hypervisor Code Integrity

17
Secure-core servers
You can enable these capabilities easily in the Windows Admin Center

18
WAC has this feature in preview

19
Microsoft long list of security features
• Different hardware requirements
System
Guard
• Different versions of Windows
• Different methods of enabling
• Confusing and frustrating to
understand

Application
Guard

20
Lack of simple
methods of
enabling security
• Enterprises struggle to implement
the vast array of security features
• Windows Hello
• FIDO2
• BitLocker
• Microsoft Defender
Application Guard (protected
browser)
• TPM
• Secure Boot
• Kernel DMA Protection
• Device health attestation
• SMB encryption

21
Virtualization-based security (VBS)

VBS, uses hardware


virtualization features
to create and isolate a
secure region of
memory from the
normal operating system

22
HVCI is referred
to as Memory
Integrity
• Hypervisor-Enforced Code
Integrity (HVCI), commonly
referred to as Memory
integrity, which uses VBS to
significantly strengthen code
integrity policy enforcement.
• Kernel mode code integrity
checks all kernel mode
drivers and binaries before
they're started, and prevents
unsigned drivers or system
files from being loaded into
system memory.
23
Test your system: DG_readiness script

24
DG_Readiness PowerShell
script
• To Validate: DG_Readiness.ps1 –Capable –
[DG/CG/HVCI] -AutoReboot
• To Enable: DG_Readiness.ps1 –Enable –[DG/CG]
–AutoReboot
• To Disable: DG_Readiness.ps1 –Disable –
[DG/CG] -AutoReboot

25
Test your system: DG_readiness tool

26
Use script to enable features

27
DGreadiness tool log file

28
msinfo32.exe

29
Virtualization-based security (VBS)

30
VBS system requirements:

• x64 CPU
• SLAT or Second Level Address Translation
• Intel VT-D or AMD-Vi
• Trusted Platform Module 2.0
• SMM protection supported firmware
• UEFI memory reporting
• Security MOR 2
• HVCI or Hypervisor Code Integrity

31
How to
enable • Mobile Device Management (MDM)
System • Group Policy
Guard • Windows Security app
• Registry
Secure
Launch

32
Enable via GPO

33
34
Enable:
VBS and hypervisor-
based code integrity
(HVCI)

35
VBS and HVCI requires restart

36
CONTACT US
mrvanderpool@techsavvyproductions.com

SOCIAL MEDIA
• YouTube:
https://www.youtube.com/user/vanderl2796/featured

• Twitter: @_TechSavvyTeam
CREDITS
• Facebook: https://www.facebook.com/Tech-Savvy-
Productions-105287381500897 • Social media logos and “Tech Savvy
• Follow on Instagram: techsavvyproductions Productions” teaser created by The 11th Hour:
• https://www.instagram.com/techsavvyproductions/ https://www.youtube.com/user/The11thH...

• Mr.V: https://www.linkedin.com/in/lowell-
vanderpool-57970623/

37
Become
a
member

38
Check out our website:
https://www.techsavvyproductions.com

39
Want an easy and free way
to support this Channel?
Please Subscribe!
80% of the individuals who watch our content do not
subscribe.

40
We have subtitles for
in many languages:

We provide subtitles on our videos into the


many languages:

41
A BIG THANK YOU
TO ALL OF OUR
VIEWERS AND
SUBSCRIBERS!

42

You might also like