Add hardware root-of-trust and silicon-assisted security features to security book

This commit is contained in:
Paolo Matarazzo
2024-04-11 07:56:11 -04:00
parent 1e7c756fe3
commit 13646c768a
3 changed files with 8 additions and 22 deletions

File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 54 KiB

View File

@ -7,7 +7,8 @@ ms.topic: include
## Hardware root-of-trust
:::image type="content" source="..\images\hardware-root-of-trust.svg" alt-text="Diagram containing a list of features." border="false":::
- [Trusted Platform Module (TPM)](#trusted-platform-module-tpm)
- [Microsoft Pluton security processor](#microsoft-pluton-security-processor)
### Trusted Platform Module (TPM)

View File

@ -7,10 +7,14 @@ ms.topic: include
## Silicon assisted security
:::image type="content" source="..\images\silicon-assisted-security.svg" alt-text="Diagram containing a list of features." border="false":::
In addition to a modern hardware root-of-trust, there are numerous other capabilities in the latest chips that harden the operating system against threats by protecting the boot process, safeguarding the integrity of memory, isolating security-sensitive compute logic, and more.
- [Secured kernel](#secured-kernel)
- [Hardware-enforced stack protection](#hardware-enforced-stack-protection)
- [Kernel Direct Memory Access (DMA) protection](#kernel-direct-memory-access-dma-protection)
- [Secured-core PC](#secured-core-pc)
- [Secured-core configuration lock](#secured-core-configuration-lock)
### Secured kernel
To secure the kernel we have two key features: virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI). All Windows 11 devices will support HVCI and most new devices will come with VBS and HVCI protection turned on by default.