UEFI Security Whitepapers from Insyde Software

Published by Insyde Software's Office of Security & Trust

Defense in Depth Against Exploits on 11th Gen Intel® Core™ Processors

In this paper, we look at a few ways you can use Insyde Software’s UEFI firmware and the Intel® System Resource Defense feature of the Intel Runtime BIOS Protection found in the 11th Gen Intel® Core™ Processor (codename Tiger Lake) when the firmware has been compromised. Either an attacker’s unauthorized code is executing in the firmware or authorized code in the firmware is executing badly under the attacker’s control. How can the user or IT administrator limit the damage and respond?

Written by Insyde Software CTO Tim Lewis

Get our new security whitepaper for 11th Gen Intel® Core™ Processors!


Best Practices for NSA's UEFI Secure Boot Guidelines

UEFI Secure Boot helps provide an effective defense against boot malware, but to increase its effectiveness against today’s increasingly sophisticated exploits, it is important to follow today’s best practices in its implementation, deployment and configurability. This whitepaper addresses how the latest recommendations for UEFI firmware from the United States NSA (National Security Agency) can be followed to design more secure devices that are able to meet some of the most stringent national security standards in the world.

The NSA’s guidelines help IT administrators and end users correctly configure the UEFI Secure Boot and related settings in their BIOS by listing six recommendations. It is not enough to have Secure Boot, it must be enabled correctly. This whitepaper describes these in more detail and how InsydeH2O® from Insyde Software supports them.

Written by Insyde Software CTO Tim Lewis

Get our new security whitepaper on Best Practices for NSA's UEFI Secure Boot Guidelines