Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Intel Announces New Hardware-based Security Capabilities

Compute Lifecycle Assurance

Compute Lifecycle Assurance

Intel Announces New Security Capabilities and Provides Update on Supply Chain Transparency Initiative

RSA CONFERENCE 2020 – San Francisco – Intel announced four new security capabilities and provided further information on its previously-announced Compute Lifecycle Assurance supply chain transparency initiative today at RSA Conference 2020 in San Francisco.

Intel hardware is the bedrock of much of the world’s computing capability. Hardware is also, says Tom Garrison, VP and GM of client security strategy and initiatives at Intel, “the bedrock of any security solution. Just as a physical structure requires a foundation established on bedrock to withstand the forces of nature, security solutions rooted in hardware will provide the greatest opportunity to provide security assurance against current and future threats.” 

Intel believes that the next ten years will see more architecture advancements than the last 50 years — starting, perhaps, with Intel’s four new capabilities. These are application isolation, VM and container isolation, full memory encryption, and Intel platform firmware resilience.

Application isolation helps protect data in use with a narrow attack surface. This will expand the existing Intel Software Guard Extensions (SGX) to a broader range of mainstream data-centric platforms, and will provide larger protected enclaves increasing the number of usages leveraging the technology.

VM and container isolation will isolate virtual environments from each other, and from the Hypervisor and cloud provider without requiring application code modifications. Noticeably, the NSA warned in January 2020, “Vulnerabilities in cloud hypervisors (i.e., the software/hardware that enables virtualization) or container platforms are especially severe due to the critical role these technologies play in securing cloud architectures and isolating customer workloads.”

Full memory encryption provides hardware-based encryption that is transparent to the operating system and software layers. Its purpose is to better protect against physical memory attacks.

Intel platform firmware resilience is a field-programmable gate array (FPGA) -based solution that helps protect firmware by monitoring and filtering malicious traffic on the system buses. It verifies the integrity of platform firmware images, and can recover corrupted firmware back to a known good state.

Advertisement. Scroll to continue reading.

Intel also announced progress on the Compute Lifecycle Assurance Initiative it introduced in December 2019. This initiative is designed to provide transparency and assurance to the complete hardware supply chain and lifecycle (build, transfer, operate and retire), starting with Intel’s own Transparent Supply Chain (TSC) tools.

The basic process is to add a root of trust and chain of trust — using the Trusted Computing Group’s (TCG) Trusted Platform Module 2.0 (TPM) standard — that can be monitored and followed from manufacture through the various different build stages to delivery and use by the customer. “This allows customers to gain traceability and accountability for platforms with component-level reporting,” says Intel.

“This chain of trust process provides essential traceability based on the TPM,” says Thorsten Stremlau, chair of TCG’s marketing work group. “Bringing component-level traceability to platforms and systems increases confidence and reduces the risk of counterfeit electronic parts while also facilitating procurement standards. This is the right direction for the industry.”

TSC is already available for Intel customers across Intel vPro platform-based PCs, Intel NUC, Intel Xeon SP systems, Intel Solid State Drives and certain Intel Core commercial PCs. Under the Compute Lifecycle Assurance Initiative, Intel also provides TSC to ecosystem partners. So far, Hyve Solutions, Inspur, Lenovo (client and server), Mitac, Quanta, Supermicro and ZT Systems have enabled Intel TSC tools. Intel also has active deployments of Intel TSC with enterprise IT and cloud service providers.

Related: Huawei and Supply Chain Security – The Great Geopolitical Debate 

Related: Firm Analyzes China, Russia-based Supply Chain Risks of eVoting Machines 

Related: Google Announces Open Source Silicon Root-of-Trust Project 

Related: Intel SGX Card Extends Memory Protections to Existing Cloud Servers 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...