Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Intel Announces Compute Lifecycle Assurance to Protect Platform Supply Chains

Compute Lifecycle Assurance

Compute Lifecycle Assurance

Globalization and business transformation have created an incredibly complex worldwide supply chain for almost all manufacturers. Hardware ostensibly manufactured in the U.S. will inevitably include components manufactured in many different locations around the world — including nations that are in other circumstances described as ‘adversary states’.

The potential for interference in the supply chain, by foreign governments or criminal gangs, exists. An example of this threat was seen in the October 2018 Bloomberg report, “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies”. This report claims that a unit of the People’s Liberation Army were involved in an operation that placed tiny spy chips on equipment manufactured in China for US-based Super Micro Computer Inc (SMC).

The report has been largely discredited in security circles, but Bloomberg has refused to remove it. True or fabricated, it is a graphic example of western fears of hardware supply chain attacks. If it were true, every subsequently manufactured SMC computer would have been delivered pre-compromised by the Chinese government.

U.S. manufacturers all attempt to protect their own supply chains. Intel, which developed its own Transparent Supply Chain set of policies, has now gone one step further. “The industry needs an end-to-end framework that can be applied across [the] multi-year life of any platform,” it announced today. “And that is our goal with the Compute Lifecycle Assurance Initiative – to substantially improve transparency and to provide higher levels of assurance that improve integrity, resilience and security during the entire platform lifecycle.”

Intel says it has identified four key lifecycle stages: build, transfer, operate and retire. It commits itself, over the next year, to build on its Transparent Supply Chain tools, to contribute best practices learned from experience, and to collaborate with the ecosystem to develop ways to improve security across the platform lifecycle. 

The project is known as the Compute Lifecycle Assurance initiative. Intel gives no details on what this might entail, but says, “In the next 12 to 18 months, we expect to see growing interest from our customers, partners and from government oversight organizations to improve transparency beyond the manufacturing supply chain to also include transportation, provisioning, attestation and in-field updates.”

Earlier this year, Intel produced a whitepaper (PDF) described as a POC “to demonstrate the viability of implementing a blockchain-centric Transparent Supply Chain capability.”

The conclusion includes, “The private blockchain reduces the overall risk by limiting blockchain data access to TSC [Transparent Supply Chain] participants only. An attacker may infer a participant’s identity and associate that identity to an Ethereum account. Nonetheless, these attacks would reveal only account ownership, so that transaction creation can be tracked to a given participant. Data confidentiality is protected by cloud storage access controls and encryption.”

Advertisement. Scroll to continue reading.

Intel Compute Lifecycle Assurance diagram

More recently, in September 2019, Intel provided a presentation (PDF) to the National Cybersecurity Center of Excellence (NCCoE). The presentation was delivered by Mark Boucher, described as the chief architect for Compute Lifecycle Assurance at Intel. It clearly shows the application of Intel’s current Transparent Supply Chain principles to a private Ethereum blockchain.

It may be, but it is not specified in today’s statement from Intel, that its view of a generic supply chain security solution is based on learned transparency principles built into a blockchain. Whether it proves to be this or something else, Intel says, “These are early days and we know we can’t do this alone. We invite the broader ecosystem to join us on this journey.”

Related: DUST Identity Emerges From Stealth to Protect Device Supply Chain 

Related: Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware 

Related: Intel Asks for Comments on Draft Federal Privacy Law

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Supply Chain Security

Security researchers with NCC Group have documented 11 vulnerabilities impacting Nuki smart lock products, including issues that could allow attackers to open doors.Nuki offers...