Skip to content

Commit

Permalink
Require full control of Secure Boot
Browse files Browse the repository at this point in the history
Signed-off-by: Andrea Bolognani <abologna@redhat.com>
  • Loading branch information
andreabolognani committed Jul 29, 2024
1 parent 1936a6c commit a7d52dc
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions server_platform_requirements.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -161,6 +161,8 @@ TBD: it is expected the high-level root of trust / boot flow requirements will c
|===
| ID# ^| Requirement
| `SEC_010` | MUST implement UEFI Secure Boot and Driver Signing (cite:[UEFI] Section 32)
| `SEC_011` | It MUST be possible for a physically present user to disable Secure Boot enforcement, thus allowing unsigned code to be executed.
| `SEC_012` | It MUST be possible for a physically present user to fully manage the contents of all Secure Boot key stores (PK, KEK, db and dbx). This includes the ability to delete all factory-provided keys, enrolling their own custom keys, and resetting all key stores to their factory state.
| `SEC_020` | MUST back the UEFI Authenticated Variables implementation with
a mechanism that cannot be accessed or tampered by an unauthorized
software or hardware agent.
Expand Down

0 comments on commit a7d52dc

Please sign in to comment.