Add hardware root-of-trust and silicon-assisted security features to security book

This commit is contained in:
Paolo Matarazzo
2024-04-11 07:56:11 -04:00
parent 1e7c756fe3
commit 13646c768a
3 changed files with 8 additions and 22 deletions

File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 54 KiB

View File

@ -7,7 +7,8 @@ ms.topic: include
## Hardware root-of-trust ## Hardware root-of-trust
:::image type="content" source="..\images\hardware-root-of-trust.svg" alt-text="Diagram containing a list of features." border="false"::: - [Trusted Platform Module (TPM)](#trusted-platform-module-tpm)
- [Microsoft Pluton security processor](#microsoft-pluton-security-processor)
### Trusted Platform Module (TPM) ### Trusted Platform Module (TPM)

View File

@ -7,10 +7,14 @@ ms.topic: include
## Silicon assisted security ## Silicon assisted security
:::image type="content" source="..\images\silicon-assisted-security.svg" alt-text="Diagram containing a list of features." border="false":::
In addition to a modern hardware root-of-trust, there are numerous other capabilities in the latest chips that harden the operating system against threats by protecting the boot process, safeguarding the integrity of memory, isolating security-sensitive compute logic, and more. In addition to a modern hardware root-of-trust, there are numerous other capabilities in the latest chips that harden the operating system against threats by protecting the boot process, safeguarding the integrity of memory, isolating security-sensitive compute logic, and more.
- [Secured kernel](#secured-kernel)
- [Hardware-enforced stack protection](#hardware-enforced-stack-protection)
- [Kernel Direct Memory Access (DMA) protection](#kernel-direct-memory-access-dma-protection)
- [Secured-core PC](#secured-core-pc)
- [Secured-core configuration lock](#secured-core-configuration-lock)
### Secured kernel ### Secured kernel
To secure the kernel we have two key features: virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI). All Windows 11 devices will support HVCI and most new devices will come with VBS and HVCI protection turned on by default. To secure the kernel we have two key features: virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI). All Windows 11 devices will support HVCI and most new devices will come with VBS and HVCI protection turned on by default.