/* Blog Tracker Script

Sunday, February 24, 2008

Comment on hardware security...

Comment by Steven Sprague, CEO, Wave Systems Corp.

Hardware Security the key to keeping your data safe

The fundamental problem with software security is that it is executed on the main processor so any secrets that are part of the "security" get exposed as part of the main memory of the system.

Most of the articles on this memory vulnerability fail to mention that this problem can be just as acute for Authentication Keys used by the VPN or Wireless infrastructure. The bad news is that you can't easily fix this with software, The good news is that solutions are available that leverage hardware security to protect the secrets.

Let me try to break the problem down and explain the tools and approaches which are available to address the memory attack problem.

The memory attack that was described by Declan McCullagh works because the secret keys used to encrypt the data need to be used by the processor and as a result must be available in the main processor memory. This is a systemic problem of an open programmable PC. The memory attacks described to find encryption keys was not all that surprising as an approach, however, the ease with which the attack could be successfully achieved was clearly unforeseen.

To address these two security challenges security hardware can be used to not just store keys securely but also use those keys for the function that needs to be executed. Let's focus on two security related functions first, authentication and second, bulk data encryption.

For VPN keys, a chip can securely create store and use the keys without the operation requiring any processing of the data within the main processor memory. A good example is the TPM (Trusted Platform Module). This is a security chip that can be found on millions of business laptops and desktops. The TPM creates a public/private key pair for securing the VPN and keeps the private key secured so that it is never exposed outside of the chip. The TPM can be asked to use this private key as an identity for authentication of the PC or the user. When used for authentication the TPM can complete the secure portion of the authentication transaction completely inside the TPM chip. This is important because the TPMs are tamper resistant and would require a significant attack effort to extract a secret key from a TPM. This is the same type of protection that is used in millions of cell phone SIM modules, smart cards and other security chips. While the TPM that is used with the Microsoft BitLocker FDE application is used to protect the keys when the PC is turned off, while the system is either running or in standby mode, the encryption keys are still exposed within the main processor of the system. The TPM is not a bulk encryption device, only a key generation and secure key storage device. Therefore, Bitlocker and other software FDE solutions, even if they support TPMs are still going to expose the encryption keys to these kinds of memory attacks.

The Seagate Momentus 5400.2 FDE drive provides an entirely different approach to the encryption solution. The disk drive controller, a powerful and secure processor, generates its own encryption keys and then encrypts/decrypts all data sent to or requested from the disk drive. In addition, the strong authentication of users using passwords is integrated directly into the drive and is performed before any foreign software, including the operating system are ever loaded. The means that all access control and encryption take place within the highly secure hardware of the disk drive. The keys which encrypt the data are not accessible and never leave the drive, so there is no exposure from the kinds of memory attacks described.

The additional benefit of integrating encryption directly into the hard drive is that system performance is never affected and main processor cycles are never used to perform the computationally intense tasks of encryption and decryption. Encryption directly in the hard drive is a win-win solution for both security and performance.

Consequently, the data protection answer is clear, enterprises should be ordering all new laptops with the highly secure Seagate Momentus 5400.2 FDE drives. Laptops with these drives are currently sold by Dell, Lenovo, NEC Europe and ASI. These solutions have robust security management software available in order to provide remote management, including full audit logging for the FDE drives in order assist in meeting compliance to the numerous data protection regulations.

Wave Systems' Embassy Trust Suite software provide the software that enable central management of both the TPM and the Seagate FDE drives. These tools make it easy to leverage these hardware security technologies to secure the enterprise.

Actions any IT department can take to reduce vulnerabilities

- Utilize the TPM chip to store any client side certificates for more secure network access and user authentication

- Specify and purchase laptops with Seagate FDE drives in all new laptops.

- Install an integrated centralized management solution for the hardware security features currently in most laptops including the TPM, FDE drives, finger print readers and smart card readers

There is no magical SW. All of the software solutions today have the same vulnerabilities to secrets being held in memory so that the processor can use them. The greater the complexity of the software the more likely there are vulnerabilities. Hardware security is a well known solution. Industry has invested to bring inexpensive robust hardware security to millions of PCs. It is time for Every VPN and every Wifi connection to leverage hardware to secure the enterprise.

Conduct an audit of the machines in your enterprise and see how many already have a TPM. Ask your network vendors for documentation on how the TPM can be used (if your network supports MSCAPI it will support a TPM) and begin to explore the use of hardware to secure your enterprise. Seagate's FDE drive is a must for anyone buying a laptop. The reduction in liability for the corporation is more than enough ROI for any IT department. It is an easy to deploy, Very secure, and easy to manage device for full disk encryption. Ask your OEM to supply you one or feel free to call Wave so we can help you evaluate the solution.

No comments: