mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 13:53:39 +00:00
Add hardware root-of-trust and silicon-assisted security features to security book
This commit is contained in:
File diff suppressed because one or more lines are too long
Before Width: | Height: | Size: 54 KiB |
@ -7,7 +7,8 @@ ms.topic: include
|
||||
|
||||
## Hardware root-of-trust
|
||||
|
||||
:::image type="content" source="..\images\hardware-root-of-trust.svg" alt-text="Diagram containing a list of features." border="false":::
|
||||
- [Trusted Platform Module (TPM)](#trusted-platform-module-tpm)
|
||||
- [Microsoft Pluton security processor](#microsoft-pluton-security-processor)
|
||||
|
||||
### Trusted Platform Module (TPM)
|
||||
|
||||
|
@ -7,10 +7,14 @@ ms.topic: include
|
||||
|
||||
## Silicon assisted security
|
||||
|
||||
:::image type="content" source="..\images\silicon-assisted-security.svg" alt-text="Diagram containing a list of features." border="false":::
|
||||
|
||||
In addition to a modern hardware root-of-trust, there are numerous other capabilities in the latest chips that harden the operating system against threats by protecting the boot process, safeguarding the integrity of memory, isolating security-sensitive compute logic, and more.
|
||||
|
||||
- [Secured kernel](#secured-kernel)
|
||||
- [Hardware-enforced stack protection](#hardware-enforced-stack-protection)
|
||||
- [Kernel Direct Memory Access (DMA) protection](#kernel-direct-memory-access-dma-protection)
|
||||
- [Secured-core PC](#secured-core-pc)
|
||||
- [Secured-core configuration lock](#secured-core-configuration-lock)
|
||||
|
||||
### Secured kernel
|
||||
|
||||
To secure the kernel we have two key features: virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI). All Windows 11 devices will support HVCI and most new devices will come with VBS and HVCI protection turned on by default.
|
||||
|
Reference in New Issue
Block a user