E.3.10 Establish a root of trust
Control Details
Objective
Provide the foundation for secure operations of a computing system
Definition
Roots of trust (RoT) are highly-reliable hardware, firmware, and software components that perform specific, critical security functions, such as storing the keys used for cryptographic functions and enabling a secure boot process. Many RoT are implemented in hardware so that malware cannot tamper with the functions they provide. The RoT is established from an offline source.
Assessment Questions
- Describe your root of trust for performing specific, critical security functions such as storing keys for cryptographic functions or enabling secure boot. How are these implemented?
Reference sources
- CNCF-SSC BP-SA: Follow best practices for establishing a root of trust from an offline source