mirror of
https://github.com/decalage2/awesome-security-hardening.git
synced 2025-01-24 14:21:12 -05:00
added ANSSI - Hardware security requirements for x86 platforms
This commit is contained in:
parent
ed0255a557
commit
d2e644c8cb
@ -285,6 +285,7 @@ See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
|
||||
|
||||
## Hardware - BIOS - UEFI
|
||||
|
||||
- [ANSSI - Hardware security requirements for x86 platforms](https://www.ssi.gouv.fr/en/guide/hardware-security-requirements-for-x86-platforms/) - recommendations for security features and configuration options applying to hardware devices (CPU, BIOS, UEFI, etc) (Nov 2019)
|
||||
- [NSA - Hardware and Firmware Security Guidance](https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance) - Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance.
|
||||
- [NSA Info Sheet: UEFI Lockdown Quick Guidance (March 2018)](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-uefi-lockdown.pdf?v=1)
|
||||
- [NSA Tech Report: UEFI Defensive Practices Guidance (July 2017)](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/ctr-uefi-defensive-practices-guidance.pdf?ver=2018-11-06-074836-090)
|
||||
|
Loading…
Reference in New Issue
Block a user