V3: Software Platform Requirements
Control Objective
The bootloader is the first piece of code to run during the device's boot process. The firmware vendor is responsible for configuring it correctly, otherwise its vulnerabilities can undermine the security of the entire device, leading to compromise and device hijacking. Controls in this chapter ensure boot trustworthiness by verifying cryptographic signatures on the loaded code, not allowing loading images from external locations, and disallowing memory, shell, and other debug access during boot.
The operating system, and its kernel in particular, are central for device security, as they run in privileged mode and implement critical device functionality, including many security primitives. This necessitates best security practices for operating system and kernel configuration and hardening.
The Linux operating system is one of the most popular in IoT. It has many features from first-line security to defense-in-depth, including the isolation mechanisms supported by namespaces and cgroups, and additional kernel security modules for access controls. Leverage these isolation mechanisms when configuring and deploying third-party applications to run within a container.
Security Verification Requirements
Bootloader
#
Description
L1
L2
L3
3.1.1
Verify that the bootloader does not allow code loaded from arbitrary locations including both local storage (e.g. SD, USB, etc.) and network locations (e.g. NFS, TFTP, etc.).
✓
✓
3.1.2
Verify bootloader configurations are immutable in production releases.
✓
✓
3.1.3
Verify that communication interfaces such as, USB, UART, and other variants are disabled or adequately protected during every stage of the device's boot process.
✓
✓
3.1.4
Verify that the authenticity of the first stage bootloader is verified by a trusted component of which the configuration in read-only memory (ROM) cannot be altered (e.g. CPU Based Secure Boot/Trusted Boot).
✓
✓
3.1.5
Verify that the authenticity of next bootloader stages or application code is cryptographically verified during every step of the boot process.
✓
✓
3.1.6
Verify that bootloader stages do not contain sensitive information (e.g. private keys or passwords logged to the console) as part of device start-up.
✓
✓
3.1.7
Verify that firmware is stored in an encrypted volume at rest.
✓
✓
3.1.8
Verify that Direct Memory Access (DMA) is not possible during boot. For example, ensure DMA is not possible via PCI connections.
✓
✓
OS Configuration
#
Description
L1
L2
L3
3.2.1
Verify that the embedded operating system is configured according to the latest industry best practices, CIS or SCAP benchmarks (if applicable), and uses secure defaults.
✓
✓
✓
3.2.2
Verify that all network services exposed by the device on every network interface are necessary services and unnecessary services are removed or disabled.
✓
✓
✓
3.2.3
Verify that the device does not make use of legacy or insecure protocols such as Telnet and FTP.
✓
✓
✓
3.2.4
Verify that the OS kernel and software components are up to date and do not contain known vulnerabilities.
✓
✓
✓
3.2.5
Verify that persistent filesystem storage volumes are encrypted.
✓
✓
3.2.6
Verify that applications running on the device use the security features of the underlying operating system or kernel. This includes cryptography, key storage, random number generation, authentication and authorization, logging, and communications security.
✓
✓
3.2.7
Verify that memory protection controls such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) are enabled by the embedded operating system.
✓
✓
3.2.8
Verify hardware level memory protection is used and privilege levels are enforced.
✓
✓
3.2.9
Verify the embedded OS provides protection against unauthorized access to RAM (e.g. RAM scrambling).
✓
3.2.10
Verify that an Integrity Measurement Architecture (IMA) is in use and appropriately configured.
✓
3.2.11
Verify that third-party applications are configured to execute within a containerized runtime environment (e.g. Linux containers, Docker, etc.) that is hardened to ensure proper isolation from the host operating system.
✓
Linux
#
Description
L1
L2
L3
3.3.1
Verify that processes are isolated using Linux kernel namespaces.
✓
✓
3.3.2
Verify that critical processes are configured to limit resources using control groups (cgroups).
✓
✓
3.3.4
Verify that Linux kernel capabilities are configured with a minimal set for processes that require elevated access.
✓
✓
3.3.5
Verify that SECure COMPuting (seccomp BPF) with filters is used and properly configured to only allow necessary system calls.
✓
✓
3.3.6
Verify the use of kernel security modules such as SELinux, AppArmor, GRSEC, and alike.
✓
Software Updates
#
Description
L1
L2
L3
3.4.1
Verify that packages and user space applications use over the air updates decoupled from firmware updates.
✓
✓
3.4.2
Verify that devices can be updated automatically upon a pre-defined schedule.
✓
✓
✓
3.4.3
Verify that updates are cryptographically signed by a trusted source and their authenticity is verified before execution.
✓
✓
✓
3.4.4
Verify that the update process is not vulnerable to time-of-check to time-of-use attacks (TOCTOU). This is generally accomplished by applying the update right after the authenticity of the update is validated.
✓
✓
✓
3.4.5
Verify that updates do not modify user-configured preferences, security, and/or privacy settings without notifying the user.
✓
✓
✓
3.4.6
Verify that the device cannot be downgraded to known vulnerable versions (anti-rollback).
✓
3.4.7
Verify that in the event of an update failure, the device reverts to a backup image or notifies the IoT ecosystem.
✓
✓
✓
3.4.8
Verify that unsigned debug pre-production firmware builds can not be flashed onto devices.
✓
✓
✓
3.4.9
Verify that encrypted firmware images are securely decrypted on the device.
✓
✓
3.4.10
Verify that the device authenticates to the update server component prior to downloading the update.
✓
✓
✓
3.4.11
Verify that firmware updates are stored encrypted server-side.
✓
✓
Security chip integrations
#
Description
L1
L2
L3
3.5.1
Verify that encryption is used on the bus between the security chip and other hardware components.
✓
✓
3.5.2
Verify that keys (either secret or private) used to enable encryption on the serial bus are properly secured on the host.
✓
✓
3.5.3
Verify any default vendor keys used in bus encryption are replaced in production builds.
✓
✓
3.5.4
Verify that deprecated insecure ciphers and hash functions (e.g. 3DES, MD5, SHA1) in new applications are not used, even if provided by the hardware security chip.
✓
✓
Kernel space application requirements
#
Description
L1
L2
L3
3.6.1
Verify that loaded kernel modules are cryptographically signed and verified.
✓
✓
3.6.2
Verify that only required kernel modules are enabled during runtime.
✓
✓
✓
References
For more information, see also:
ENISA - Baseline Security Recommendations for IoT: https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport
CIS Benchmarks: https://www.cisecurity.org/cis-benchmarks/
TGC Guidance for Secure Update of Software and Firmware on Embedded Systems: https://trustedcomputinggroup.org/wp-content/uploads/TCG-Secure-Update-of-SW-and-FW-on-Devices-v1r72_pub.pdf
U-Boot FIT Signature Verification: https://github.com/u-boot/u-boot/blob/master/doc/uImage.FIT/signature.txt
GSMA - IoT Security Guidelines for Endpoint Systems: https://www.gsma.com/iot/wp-content/uploads/2017/10/CLP.13-v2.0.pdf
OWASP Docker Top 10: https://owasp.org/www-project-docker-top-10/
Linux Containers Security (LXC): https://linuxcontainers.org/lxc/security/
Linux Containers Security (LXD): https://linuxcontainers.org/lxd/docs/master/security
Last updated