What is hardware security

Add a new layer of hardware-based security

Hardware security versus software security
A new emerging vulnerability is the code in the device firmware that runs at startup to prepare for the operating system to start. Hackers are looking for ways to inject malware into this code under the operating system, the code sequence of which by default did not require security and integrity checks. The result is that the operating system trusts this code even if it contains a malicious malware payload.

Tampering is another way malware can appear on the operating system anywhere in the deployment process. Physical attacks are becoming easier and more worrying for IT teams. To defend against this threat, a modern PC platform can integrate hardware-enhanced security that begins on the production line. In addition to the manufacturers who guarantee the authenticity of certified device components, golden measurements of the firmware code are made before the firmware is encrypted before transport and delivery. With this approach, IT can determine whether the newly received device was tampered with before it was switched on for the first time.

Of course, manipulations can occur at any time in the system's life cycle. At each subsequent start, the computer technology checks the loaders that start the code and executes the start sequence of the firmware and the operating system. This additional layer of security helps reduce the risk of tampering to introduce malicious code into the operating system.