Tackling the toughest FISMA requirement: Firmware integrity

 

Connecting state and local government leaders

Agencies would be wise to start thinking about firmware as another layer in the stack that must be managed and secured.

Firmware is under attack, yet few organizations have matured beyond a state of foundational security to address more advanced security controls such as firmware integrity. Given the potential impacts of compromised firmware, agency personnel must determine how and when to tackle one of the most difficult security controls, the National Institute of Standards and Technology's SP 800-53 SI-7: Software, Firmware and Information Integrity, referred to as SI-7.

All security controls considered equal?

The Federal Information Security Management Act provides guidance as to which security controls and subcontrols must be addressed for information systems categorized as being of “Low,” “Moderate” or “High” potential impact.  However, within those categorizations, all NIST 800-53 security controls are considered equal, meaning that an agency “Moderate” system must prioritize and comply with all of the indicated subcontrols, from the most basic to more-advanced controls such as SI-7.  That’s not so easy to do, given the varying agency maturity levels across government. After agencies progress beyond implementation of basic foundational controls -- such as log management, configuration management and vulnerability management -- they are then positioned to tackle some of the more advanced controls.

With so many agencies still considered to be at a low-tier maturity level, firmware integrity is not often addressed as a priority. So, does a lack of security maturity justify a lack of firmware priority? Well, no, because it is a FISMA requirement and, perhaps more importantly, because the risks of firmware compromise have gotten much greater since the inclusion of SI-7 in the original release of FISMA.

The evolution of firmware compromise

According to Tripwire’s David Henderson, the term “firmware” has evolved significantly over the years. Once considered the underlying layer of a system architecture that was not easily accessed or altered, firmware is now “accessible by anyone with a device that can communicate on or over a network,” he wrote in his blog.

[Today]…Firmware can be found in many places such as startup and timing devices in home appliances, light bulbs, home thermostats, our automobiles, our computers and embedded or installed components such as storage systems. What about the network routers, switches, firewalls and intrusion detection systems at the office, not to mention the Internet of Things? Yes and yes. Our phones, mp3 players, tablets and a host of other devices also contain firmware.

According to NIST security expert Andrew Regenscheid, firmware protection has become an increasingly important issue over the past 10 years. Regenscheid started leading NIST’s firmware protection guidance efforts in 2010, he and co-authored NIST’s first firmware guidance, NIST SP 800-147: BIOS Protection Guidelines, among others. He said federal agencies were among the first to recognize the need to build firmware protections into the purchasing process, after research into early attacks indicated a potential for compromise at the firmware level. In an effort to help ensure a higher degree of security in products purchased by the government, “SP 800-147 was intended to identify technical guidelines for how PC manufacturers could protect the BIOS,” Regenscheid said.

Potential impact

SP 800-147 raised the bar for firmware in PCs.  However, given the increasing complexity of firmware and its privileged position in PC architectures, the potential security impacts have become significant. In critical infrastructure environments, the physical safety of U.S. citizens is of top concern. Next on the list would be a firmware attack's resulting loss of productivity, such as the $10B cost of downtime to organizations hit by notPetya. Of equal significance is the potential of sensitive data loss via undetected hardware security flaws such as Spectre and Meltdown,  which were mitigated with firmware updates.

With the potential loss of safety, productivity and sensitive data due to the rise in firmware vulnerabilities, more standards organizations are “getting tough” on ensuring firmware protections. Agency personnel should expect the same evolution from the government regulatory community as well.

Where to start?

Regenscheid advises agencies "to look at the risks that are most relevant by their systems. You have to then look at where firmware security falls on that list which will dictate what priority you give it.” He gives the example that many components in PCs, such as video or network cards, have updatable firmware and are also at risk for attacks. This would be an area to elevate in priority and to regularly update. NIST released new guidelines in May 2018, SP 800-193: Platform Firmware Resiliency Guidelines, to address firmware-related threats to these components.

After ensuring regular firmware updates, agencies can look at monitoring firmware for unscheduled changes. They should start by asking the following:

  • Is firmware being monitored today? If so, how?
  • Does the current integrity management solution support firmware monitoring? If not, can this feature be added? 
  • What level of effort will be required to implement a broader monitoring solution?

Agencies would be wise to start thinking about firmware as another layer in the stack that must be managed and secured. From a solutions perspective, vendors have taken a number of different approaches -- from building firmware monitoring point solutions to incorporating firmware integrity management as one component of the overall integrity software tool suite. Ideally, the solution will detect potential firmware attacks, monitor firmware for unscheduled changes and be capable of recovering the firmware to its original state.

NEXT STORY: Treating health care's cyber ills

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.