SHARE
Facebook X Pinterest WhatsApp

BIOS Protection Guidelines

BIOS Protection Guidelines Minimize security risks by implementing protective measures that make your desktop and mobile workstations less vulnerable to BIOS-targeting malware. Modern computers rely on fundamental system firmware, commonly known as the system Basic Input/Output System (BIOS), to facilitate the hardware initialization process and transition control to the operating system. The system BIOS is […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 7, 2011

BIOS Protection Guidelines

Minimize security risks by implementing protective measures that make your desktop and mobile workstations less vulnerable to BIOS-targeting malware.


Modern computers rely on fundamental system firmware, commonly known as the system
Basic Input/Output System (BIOS), to facilitate the hardware initialization process and
transition control to the operating system. The system BIOS is typically developed by
both original equipment manufacturers (OEMs) and independent BIOS vendors, and is
distributed to end users by motherboard or computer manufacturers. Manufacturers
frequently update system firmware to fix bugs, patch vulnerabilities and support new
hardware.

Malicious code in the system BIOS is a significant security threat because the BIOS
executes very early in the boot process and initializes many key hardware and software
components. While there are a variety of threats to the integrity of the system BIOS,
this guide is focused on preventing the update of the system BIOS by malicious
software. The security controls and procedures specified in this document are oriented
to desktops and laptops deployed in enterprise environments.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • BIOS Protection Guidelines.pdf

Recommended for you...

Top Managed Service Providers (MSPs) 2022
Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.