311 KB | 3 files | PDF, DOC
Minimize security risks by implementing protective measures that make your desktop and mobile workstations less vulnerable to BIOS-targeting malware.
Modern computers rely on fundamental system firmware, commonly known as the system Basic Input/Output System (BIOS), to facilitate the hardware initialization process and transition control to the operating system. The system BIOS is typically developed by both original equipment manufacturers (OEMs) and independent BIOS vendors, and is distributed to end users by motherboard or computer manufacturers. Manufacturers frequently update system firmware to fix bugs, patch vulnerabilities and support new hardware.
Malicious code in the system BIOS is a significant security threat because the BIOS executes very early in the boot process and initializes many key hardware and software components. While there are a variety of threats to the integrity of the system BIOS, this guide is focused on preventing the update of the system BIOS by malicious software. The security controls and procedures specified in this document are oriented to desktops and laptops deployed in enterprise environments.
The attached Zip file includes:
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ... More >>