@@ -281,7 +281,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
281
281
| Name| SecuredCore.Hardware.Identity| x86/AMD64| Arm64|
282
282
| :---| :---| :---| :---|
283
283
| Description| The purpose of the test is to validate the device identify is rooted in hardware.|||
284
- | Requirements dependency|| TPM v2.0 device| TPM v2.0 <sup >or * other supported method</sup >|
284
+ | Requirements dependency|| TPM v2.0 device| TPM v2.0 </ br >< sup >or * other supported method</sup >|
285
285
| Status| Required| 2023| 2023|
286
286
| Validation Type| Manual/Tools|||
287
287
| Validation| Device to be validated through toolset to ensure that the device has a HWRoT present and that it can be provisioned through DPS using TPM or SE.|||
@@ -327,7 +327,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
327
327
| :---| :---| :---| :---|
328
328
| Status| Required| 2023| 2023|
329
329
| Description| The purpose of the test is to ensure the device can remotely attest to the Microsoft Azure Attestation service.|
330
- | Dependency|| TPM 2.0| TPM 2.0 <sup >or * supported OP-TEE based application chained to a HWRoT (Secure Element or Secure Enclave)</sup >|
330
+ | Dependency|| TPM 2.0| TPM 2.0 </ br >< sup >or * supported OP-TEE based application chained to a HWRoT (Secure Element or Secure Enclave)</sup >|
331
331
| Validation Type| Manual/Tools|
332
332
| Validation| Device to be validated through toolset to ensure that platform boot logs and applicable runtime measurements can be collected and remotely attested to the Microsoft Azure Attestation service.|
333
333
| Resources| [ Microsoft Azure Attestation] ( ../attestation/index.yml ) </br > Certification portal test includes an attestation client that when combined with the TPM 2.0 can validate the Microsoft Azure Attestation service.|
@@ -527,43 +527,43 @@ Additional considerations for Azure Sphere are provided as an application note h
527
527
528
528
529
529
---
530
- | Name| SecuredCore.Hardware.Identity| x86/AMD64 | Arm64 |
531
- | :---| :---| :---| :--- |
532
- | Description | The purpose of the test is to validate the device identify is rooted in hardware. || |
533
- | Requirements dependency || TPM v2.0 device| TPM v2.0,Secure Element |
534
- | Status | Required | 2023 | 2023 |
530
+ | Name| SecuredCore.Hardware.Identity| Sphere |
531
+ | :---| :---| :---|
532
+ | Status | Required | 2023 |
533
+ | Description | The purpose of the test is to validate the device identify is rooted in hardware. | |
534
+ | Requirements dependency || |
535
535
| Validation Type| Pre-validated, no additional validation is required|||
536
536
| Validation| Provided by Microsoft|||
537
537
| Resources| [ Setup auto provisioning with DPS] ( ../iot-dps/quick-setup-auto-provision.md ) |||
538
538
539
539
---
540
540
</br >
541
541
542
- | Name| SecuredCore.Hardware.MemoryProtection| x86/AMD64 | Arm64 |
543
- | :---| :---| :---| :--- |
544
- | Status| Required| 2023| 2023 |
545
- | Description| The purpose of the test is to validate that DMA is not enabled on externally accessible ports .|
542
+ | Name| SecuredCore.Hardware.MemoryProtection| Sphere |
543
+ | :---| :---| :---|
544
+ | Status| Required| 2023|
545
+ | Description| The purpose of the test is to ensure that memory integrity helps protect the device from vulnerable peripherals .|
546
546
| Validation Type| Automated|
547
547
| Validation| Provided by Microsoft|
548
548
| Resources||
549
549
550
550
</br >
551
551
552
552
---
553
- | Name| SecuredCore.Firmware.Protection| x86/AMD64 | Arm64 |
554
- | :---| :---| :---| :--- |
555
- | Status| Required| 2023| 2023 |
553
+ | Name| SecuredCore.Firmware.Protection| Sphere |
554
+ | :---| :---| :---|
555
+ | Status| Required| 2023|
556
556
| Description| The purpose of the test is to ensure that device has adequate mitigations from Firmware security threats.|
557
557
| Validation Type| Automated|
558
558
| Validation| Provided by Microsoft|
559
- | Resources| https://trustedcomputinggroup.org/ |
559
+ | Resources||
560
560
561
561
---
562
562
</br >
563
563
564
- | Name| SecuredCore.Firmware.SecureBoot| x86/AMD64 | Arm64 |
565
- | :---| :---| :---| :--- |
566
- | Status| Required| 2023| 2023 |
564
+ | Name| SecuredCore.Firmware.SecureBoot| Sphere |
565
+ | :---| :---| :---|
566
+ | Status| Required| 2023|
567
567
| Description| The purpose of the test is to validate the boot integrity of the device.|
568
568
| Validation Type| Automated|
569
569
| Validation| Provided by Microsoft|
@@ -572,43 +572,43 @@ Additional considerations for Azure Sphere are provided as an application note h
572
572
---
573
573
</br >
574
574
575
- | Name| SecuredCore.Firmware.Attestation| x86/AMD64 | Arm64 |
576
- | :---| :---| :---| :--- |
577
- | Status| Required| 2023| 2023 |
575
+ | Name| SecuredCore.Firmware.Attestation| Sphere |
576
+ | :---| :---| :---|
577
+ | Status| Required| 2023|
578
578
| Description| The purpose of the test is to ensure the device can remotely attest to the Microsoft Azure Attestation service.|
579
579
| Dependency|| TPM 2.0| To be announced|
580
580
| Validation Type| Automated|
581
581
| Validation| Provided by Microsoft|
582
- | Resources| [ Microsoft Azure Attestation ] ( ../attestation/index.yml ) |
582
+ | Resources||
583
583
584
584
---
585
585
</br >
586
586
587
- | Name| SecuredCore.Hardware.SecureEnclave| x86/AMD64 | Arm64 |
588
- | :---| :---| :---| :--- |
589
- | Status| Optional | Comming soon | Comming soon |
590
- | Description| The purpose of the test to validate the existence of a secure enclave and that the enclave is accessible from a secure agent .|
587
+ | Name| SecuredCore.Hardware.SecureEnclave| Sphere |
588
+ | :---| :---| :---|
589
+ | Status| Required | 2023 |
590
+ | Description| The purpose of this reqiurement is to validate hardware security that is accessible from a secure operating system .|
591
591
| Validation Type| Automated|
592
592
| Validation| Provided by Microsoft|
593
- | Resources| https://github.com/openenclave/openenclave/blob/master/samples/BuildSamplesLinux.md |
593
+ | Resources||
594
594
595
595
## Linux Configuration Requirements
596
596
597
597
---
598
- | Name| SecuredCore.Encryption.Storage| x86/AMD64 | Arm64 |
599
- | :---| :---| :---| :--- |
600
- | Status| Required| 2023| 2023 |
601
- | Description| The purpose of the test to validate that sensitive data can be encrypted on non-volatile storage.|
598
+ | Name| SecuredCore.Encryption.Storage| Sphere |
599
+ | :---| :---| :---|
600
+ | Status| Required| 2023|
601
+ | Description| The purpose of this reqiurement is to validate that sensitive data can be encrypted on non-volatile storage.|
602
602
| Validation Type| Automated|
603
603
| Validation| Provided by Microsoft|
604
- | Resources||
604
+ | Resources| [ Data at rest protection on Azure Sphere ] ( https://learn.microsoft.com/azure-sphere/app-notes/app-notes-overview ) |
605
605
606
606
---
607
607
</br >
608
608
609
- | Name| SecuredCore.Encryption.TLS| x86/AMD64 | Arm64 |
610
- | :---| :---| :---| :--- |
611
- | Status| Required| 2023| 2023 |
609
+ | Name| SecuredCore.Encryption.TLS| Sphere |
610
+ | :---| :---| :---|
611
+ | Status| Required| 2023|
612
612
| Description| The purpose of the test is to validate support for required TLS versions and cipher suites.|
613
613
| Validation Type| Automated|
614
614
| Validation| Provided by Microsoft|
@@ -617,9 +617,9 @@ Additional considerations for Azure Sphere are provided as an application note h
617
617
---
618
618
</br >
619
619
620
- | Name| SecuredCore.Protection.CodeIntegrity| x86/AMD64 | Arm64 |
621
- | :---| :---| :---| :--- |
622
- | Status| Required| 2023| 2023 |
620
+ | Name| SecuredCore.Protection.CodeIntegrity| Sphere |
621
+ | :---| :---| :---|
622
+ | Status| Required| 2023|
623
623
| Description| The purpose of this test is to validate that authorized code runs with least privilege.|
624
624
| Validation Type| Automated|
625
625
| Validation| Provided by Microsoft|
@@ -628,69 +628,80 @@ Additional considerations for Azure Sphere are provided as an application note h
628
628
---
629
629
</br >
630
630
631
- | Name| SecuredCore.Protection.NetworkServices| x86/AMD64 | Arm64 |
632
- | :---| :---| :---| :--- |
633
- | Status| Required| 2023| 2023 |
631
+ | Name| SecuredCore.Protection.NetworkServices| Sphere |
632
+ | :---| :---| :---|
633
+ | Status| Required| 2023|
634
634
| Description| The purpose of the test is to validate that applications accepting input from the network are not running with elevated privileges.|
635
635
| Validation Type| Automated|
636
636
| Validation| Provided by Microsoft|
637
637
| Resources||
638
638
639
+ ---
640
+ </br >
641
+
642
+ | Name| SecuredCore.Protection.NetworkFirewall| Sphere|
643
+ | :---| :---| :---|
644
+ | Status| Required| 2023|
645
+ | Description| The purpose of this requirement is to validate that applications cannot connect to endpoints that have not been authorized.|
646
+ | Validation Type| Automated|
647
+ | Validation| Provided by Microsoft|
648
+ | Resources||
649
+
639
650
640
651
## Sphere Software/Service Requirements
641
652
---
642
- | Name| SecuredCore.Built-in.Security| x86/AMD64 | Arm64 |
643
- | :---| :---| :---| :--- |
644
- | Status| Required| 2023| 2023 |
653
+ | Name| SecuredCore.Built-in.Security| Sphere |
654
+ | :---| :---| :---|
655
+ | Status| Required| 2023|
645
656
| Description| The purpose of the test is to make sure devices can report security information and events by sending data to Azure Defender for IoT. <br >Note: Download and deploy security agent from GitHub|
646
657
| Validation Type| Automated|
647
658
| Validation| Provided by Microsoft|
648
- | Resources| [ Azure Docs IoT Defender for IoT ] ( ../defender-for-iot/how-to- configure-agent-based-solution.md ) |
659
+ | Resources| [ Collect and interpret error data - Azure Sphere ] ( https://learn.microsoft.com/azure-sphere/deployment/interpret-error-data?tabs=cliv2beta ) </ br > [ Configure crash dumps - Azure Sphere ] ( https://learn.microsoft.com/azure-sphere/deployment/ configure-crash-dumps ) |
649
660
650
661
---
651
662
</br >
652
663
653
- | Name| SecuredCore.Manageability.Configuration| x86/AMD64 | Arm64 |
654
- | :---| :---| :---| :--- |
655
- | Status| Required| 2023| 2023 |
656
- | Description| The purpose of the test is to validate that device supports auditing and setting of system configuration (and certain management actions such as reboot) through Azure. Note: Use of other system management toolchains (e.g., Ansible, etc.) by operators is not prohibited, but the device must include the azure-osconfig agent such that it is ready to be managed from Azure .|
657
- | Dependency| azure-osconfig |
664
+ | Name| SecuredCore.Manageability.Configuration| Sphere |
665
+ | :---| :---| :---|
666
+ | Status| Required| 2023|
667
+ | Description| The purpose of this requirement is to validate the device supports remote adiministration via service-based configuration control .|
668
+ | Dependency||
658
669
| Validation Type| Automated|
659
670
| Validation| Provided by Microsoft|
660
671
| Resources||
661
672
662
673
---
663
674
</br >
664
675
665
- | Name| SecuredCore.Update| x86/AMD64 | Arm64 |
666
- | :---| :---| :---| :--- |
667
- | Status| Audit | 2023 | 2023|
668
- | Description| The purpose of the test is to validate the device can receive and update its firmware and software.|
669
- | Validation Type| Manual/Tools |
670
- | Validation| Partner confirmation that they were able to send an update to the device through Azure Device update and other approved services. |
671
- | Resources| [ Device Update for IoT Hub ] ( ../iot-hub-device-update/index.yml ) |
676
+ | Name| SecuredCore.Update| Sphere |
677
+ | :---| :---| :---|
678
+ | Status| Required | 2023|
679
+ | Description| The purpose of the requirement is to validate the device can receive and update its firmware and software.|
680
+ | Validation Type| Automated |
681
+ | Validation| Provided by Microsoft |
682
+ | Resources||
672
683
673
684
---
674
685
</br >
675
686
676
- | Name| SecuredCore.Protection.Baselines| x86/AMD64 | Arm64 |
677
- | :---| :---| :---| :--- |
678
- | Status| Required| 2023| 2023 |
679
- | Description| The purpose of the test is to validate the extent to which the device implements the Azure Security Baseline |
687
+ | Name| SecuredCore.Protection.Baselines| Sphere |
688
+ | :---| :---| :---|
689
+ | Status| Required| 2023|
690
+ | Description| The purpose of the requirement is to validate that the system conforms to a baseline security configuration |
680
691
| Dependency| azure-osconfig|
681
- | Validation Type| Manual/Tools |
682
- | Validation| OSConfig is present on the device and reporting to what extent it implemets the Azure Security Baseline. |
683
- |Resources| < ul >< li > https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines </ li >< li > https://www.cisecurity.org/cis-benchmarks/ </ li >< li > https://learn.microsoft.com/en-us/azure/governance/policy/samples/guest-configuration-baseline-linux| </ li ></ ul >
692
+ | Validation Type| Automated |
693
+ | Validation| Provided by Microsoft |
694
+ | Resources||
684
695
685
696
---
686
697
</br >
687
698
688
- | Name| SecuredCore.Protection.SignedUpdates| x86/AMD64 | Arm64 |
689
- | :---| :---| :---| :--- |
690
- | Status| Required| 2023| 2023 |
691
- | Description| The purpose of the test is to validate that updates must be signed.|
692
- | Validation Type| Manual/Tools |
693
- |Validation|Device to be validated through toolset to ensure that updates to the operating system, drivers, application software, libraries, packages and firmware will not be applied unless properly signed and validated.
699
+ | Name| SecuredCore.Protection.SignedUpdates| Sphere |
700
+ | :---| :---| :---|
701
+ | Status| Required| 2023|
702
+ | Description| The purpose of the requirement is to validate that updates must be signed.|
703
+ | Validation Type| Automated |
704
+ | Validation| Provided by Microsoft |
694
705
| Resources||
695
706
696
707
0 commit comments