- Community Home
- >
- Partner Solutions and Certifications
- >
- Alliances
- >
- Firmware security: How legacy firmware leaves cust...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Firmware security: How legacy firmware leaves customers open to cyberattack
While most organizations understand the need for prompt software updates in order to maintain cybersecurity, firmware updates are often overlooked. This may be because they are seen as more complex, time-consuming, and risky than software updates, which tend to be fairly routine and automated. However, because firmware is the interface between the hardware and the operating system, it can offer a gateway for destructive malware running in a privileged execution domain.
Cybercriminals have taken note of this vulnerability, leading to a recent rise in cyberattacks targeting firmware. In fact, according to a recent Microsoft survey, 80% of enterprises have experienced at least one firmware attack in the past two years, but only 29% of security budgets are dedicated to firmware security.1
HPE recommends the following steps to enhance firmware security:
- Inventory and assess what equipment might contain embedded firmware and be open to the Internet. A large organization could have tens of thousands of pieces of firmware.
- Rank the threat level from 0-10 and find a way to secure anything with a score of 7 or higher. This may mean patching the firmware or segmenting and shielding it using a zero-trust model.
- Invest in equipment built to protect firmware. For example, HPE is building infrastructure trust services into its servers. Our silicon root of trust authenticates the firmware before a server boots an OS and can be set to check firmware validity every 24 hours. In addition, HPE Integrated Lights Out (iLO) works with silicon root of trust to continuously ensure files remain in good working order while tracking any changes that could suggest an attack is underway. If that is the case, iLO immediately isolates the malware and restores the infrastructure to its last known good state.
- Follow industry standards. HPE also recommends looking for equipment that follows two relevant industry standards:
- NIST SP 800-147B describes secure BIOS and firmware update procedures and policies and specifies the use of a hardware root of trust.
- NIST SP 800-193 defines a protect, detect, and recover scheme for critical firmware.
In short, organizations need to consider firmware security as part of their evaluation and procurement processes when purchasing new servers and other hardware.
To learn more, visit:
- Blog: Rise in attacks exposes neglected firmware security
- On-demand video: Element of Protection: The Zero-Day Dilemma
1Threat Post, โ80% of Global Enterprises Report Firmware Cyberattacks,โ April 2021.
- Back to Blog
- Newer Article
- Older Article
- JoeV_The_CT on: Streamline AI Workloads with HPE & NVIDIA
- iVAN LINARES on: Curious about Windows Server 2022 downgrade rights...
- HPEML350_22 on: Windows Server 2022 is here: how to implement it o...
- testingis on: How are you going to license that new server? A st...
- wowu on: Pick up the pace
- nice345 on: Donโt let the time slip away
- vmigliacc on: Frequently asked questions about HPE solutions for...
- MassimilianoG on: What are downgrade and Down-edition rights for Win...
- harithachinni on: Coffee Coaching's "Must See" Discover Virtual Expe...
- FannyO on: TOP 10 Reasons for choosing HPE for SAP HANA
-
Accenture
1 -
Citrix
13 -
Coffee Coaching
345 -
Event
67 -
Microsoft
195 -
Red Hat
7 -
SAP
40 -
Strategic Alliances
88 -
Veeam
8 -
VMware
34