311 KB | 3 files | PDF, DOC
Minimize security risks by implementing protective measures that make your desktop and mobile workstations less vulnerable to BIOS-targeting malware.
Modern computers rely on fundamental system firmware, commonly known as the system Basic Input/Output System (BIOS), to facilitate the hardware initialization process and transition control to the operating system. The system BIOS is typically developed by both original equipment manufacturers (OEMs) and independent BIOS vendors, and is distributed to end users by motherboard or computer manufacturers. Manufacturers frequently update system firmware to fix bugs, patch vulnerabilities and support new hardware.
Malicious code in the system BIOS is a significant security threat because the BIOS executes very early in the boot process and initializes many key hardware and software components. While there are a variety of threats to the integrity of the system BIOS, this guide is focused on preventing the update of the system BIOS by malicious software. The security controls and procedures specified in this document are oriented to desktops and laptops deployed in enterprise environments.
The attached Zip file includes:
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>