All
All

BIOS Protection Guidelines

311 KB | 3 files |  PDF, DOC

Minimize security risks by implementing protective measures that make your desktop and mobile workstations less vulnerable to BIOS-targeting malware.

Modern computers rely on fundamental system firmware, commonly known as the system Basic Input/Output System (BIOS), to facilitate the hardware initialization process and transition control to the operating system. The system BIOS is typically developed by both original equipment manufacturers (OEMs) and independent BIOS vendors, and is distributed to end users by motherboard or computer manufacturers. Manufacturers frequently update system firmware to fix bugs, patch vulnerabilities and support new hardware.

Malicious code in the system BIOS is a significant security threat because the BIOS executes very early in the boot process and initializes many key hardware and software components. While there are a variety of threats to the integrity of the system BIOS, this guide is focused on preventing the update of the system BIOS by malicious software. The security controls and procedures specified in this document are oriented to desktops and laptops deployed in enterprise environments.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • BIOS Protection Guidelines.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Survey03 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials. ...  More >>

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices. ...  More >>

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date