Skip to content

Commit 49ed42f

Browse files
committed
Linux textual updates complete
1 parent 7080b0d commit 49ed42f

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

articles/certification/program-requirements-edge-secured-core.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
281281
|Name|SecuredCore.Hardware.Identity|x86/AMD64|Arm64|
282282
|:---|:---|:---|:---|
283283
|Description|The purpose of the test is to validate the device identify is rooted in hardware.|||
284-
|Requirements dependency||TPM v2.0 device|TPM v2.0 or <sup>*<sup>other supported method|
284+
|Requirements dependency||TPM v2.0 device|TPM v2.0 <sup>or *other supported method</sup>|
285285
|Status|Required|2023|2023|
286286
|Validation Type|Manual/Tools|||
287287
|Validation|Device to be validated through toolset to ensure that the device has a HWRoT present and that it can be provisioned through DPS using TPM or SE.|||
@@ -293,9 +293,9 @@ Edge Secured-core validation on Linux based devices is executed through a contai
293293
|Name|SecuredCore.Hardware.MemoryProtection|x86/AMD64|Arm64|
294294
|:---|:---|:---|:---|
295295
|Status|Required|2023|2023|
296-
|Description|The purpose of the test is to validate that DMA is not enabled on externally accessible ports.|
296+
|Description|The purpose of the test is to validate ensure that memory integrity helps protect the device from vulnerable peripherals.|
297297
|Validation Type|Manual/Tools|
298-
|Validation|If DMA capable external ports exist on the device, toolset to validate that the IOMMU or SMMU is enabled and configured for those ports.|
298+
|Validation|memory regions for peripherals must be gated with hardware/firmware such as memory region domain controllers or SMMU (System memory management Unit).|
299299
|Resources||
300300

301301
</br>
@@ -327,21 +327,21 @@ Edge Secured-core validation on Linux based devices is executed through a contai
327327
|:---|:---|:---|:---|
328328
|Status|Required|2023|2023|
329329
|Description|The purpose of the test is to ensure the device can remotely attest to the Microsoft Azure Attestation service.|
330-
|Dependency||TPM 2.0|To be announced|
330+
|Dependency||TPM 2.0|TPM 2.0 <sup>or *supported OP-TEE based application chained to a HWRoT (Secure Element or Secure Enclave)</sup>|
331331
|Validation Type|Manual/Tools|
332-
|Validation|Device to be validated through toolset to ensure that platform boot logs and measurements of boot activity can be collected and remotely attested to the Microsoft Azure Attestation service.|
333-
|Resources| [Microsoft Azure Attestation](../attestation/index.yml) |
332+
|Validation|Device to be validated through toolset to ensure that platform boot logs and applicable runtime measurements can be collected and remotely attested to the Microsoft Azure Attestation service.|
333+
|Resources| [Microsoft Azure Attestation](../attestation/index.yml) </br> Certification portal test includes an attestation client that when combined with the TPM 2.0 can validate the Microsoft Azure Attestation service.|
334334

335335
---
336336
</br>
337337

338338
|Name|SecuredCore.Hardware.SecureEnclave|x86/AMD64|Arm64|
339339
|:---|:---|:---|:---|
340-
|Status|Optional|Comming soon|Comming soon|
341-
|Description|The purpose of the test to validate the existence of a secure enclave and that the enclave is accessible from a secure agent.|
340+
|Status|Required|Future|Future|
341+
|Description|The purpose of the test to validate the existence of a secure enclave and that the enclave can be used for security functions.|
342342
|Validation Type|Manual/Tools|
343-
|Validation|Device to be validated through toolset to ensure the Azure Security Agent can communicate with the secure enclave|
344-
|Resources|https://github.com/openenclave/openenclave/blob/master/samples/BuildSamplesLinux.md|
343+
|Validation||
344+
|Resources||
345345

346346
## Linux Configuration Requirements
347347

@@ -381,7 +381,7 @@ Validation|Device to be validated through toolset to ensure the device supports
381381

382382
|Name|SecuredCore.Protection.NetworkServices|x86/AMD64|Arm64|
383383
|:---|:---|:---|:---|
384-
|Status|Required|2023|2023|
384+
|Status|<sup>*</sup>Required|2023|2023|
385385
|Description|The purpose of the test is to validate that applications accepting input from the network are not running with elevated privileges.|
386386
|Validation Type|Manual/Tools|
387387
|Validation|Device to be validated through toolset to ensure that services accepting network connections are not running with SYSTEM or root privileges.|
@@ -393,9 +393,9 @@ Validation|Device to be validated through toolset to ensure the device supports
393393
|Name|SecuredCore.Built-in.Security|x86/AMD64|Arm64|
394394
|:---|:---|:---|:---|
395395
|Status|Required|2023|2023|
396-
|Description|The purpose of the test is to make sure devices can report security information and events by sending data to Azure Defender for IoT. <br>Note: Download and deploy security agent from GitHub|
396+
|Description|The purpose of the test is to make sure devices can report security information and events by sending data to Microsoft Defender for IoT.|
397397
|Validation Type|Manual/Tools|
398-
|Validation |<ol><li>Device must generate security logs and alerts.</li><li>Device logs and alerts messages to Azure Security Center.</li><li>Device must have the Azure Defender microagent running</li><li>Configuration_Certification_Check must report TRUE in the module twin</li><li>Validate alert messages from Azure Defender for IoT.</li></ol>|
398+
|Validation |<ol><li>Device must generate security logs and alerts.</li><li>Device logs and alerts messages to Azure Security Center.</li><li>Device must have the Azure Defender for IoT microagent running</li><li>Configuration_Certification_Check must report TRUE in the module twin</li><li>Validate alert messages from Azure Defender for IoT.</li></ol>|
399399
|Resources|[Azure Docs IoT Defender for IoT](../defender-for-iot/how-to-configure-agent-based-solution.md)|
400400

401401
---
@@ -404,10 +404,10 @@ Validation|Device to be validated through toolset to ensure the device supports
404404
|Name|SecuredCore.Manageability.Configuration|x86/AMD64|Arm64|
405405
|:---|:---|:---|:---|
406406
|Status|Required|2023|2023|
407-
|Description|The purpose of the test is to validate that device supports auditing and setting of system configuration (and certain management actions such as reboot) through Azure. Note: Use of other system management toolchains (e.g., Ansible, etc.) by operators is not prohibited, but the device must include the azure-osconfig agent such that it is ready to be managed from Azure.|
407+
|Description|The purpose of the test is to validate that device supports auditing and setting of system configuration (and certain management actions such as reboot) through Azure.|
408408
|Dependency|azure-osconfig|
409409
|Validation Type|Manual/Tools|
410-
|Validation|<ol><li>Device must report, via IoT Hub, its firewall state, firewall fingerprint, ip addresses, network adapter state, host name, hosts file, TPM (absence, or presence with version) and package manager sources (see What can I manage) </li><li>Device must accept the creation, via IoT Hub, of a default firewall policy (accept vs drop), and at least one firewall rule, with positive remote acknowledgement (see configurationStatus)</li><li>Device must accept the replacement of /etc/hosts file contents via IoT Hub, with positive remote acknowledgement (see https://learn.microsoft.com/en-us/azure/osconfig/howto-hosts?tabs=portal#the-object-model )</li><li>Device must accept and implement, via IoT Hub, remote reboot</li></ol>|
410+
|Validation|<ol><li>Device must report, via IoT Hub, its firewall state, firewall fingerprint, ip addresses, network adapter state, host name, hosts file, TPM (absence, or presence with version) and package manager sources (see What can I manage) </li><li>Device must accept the creation, via IoT Hub, of a default firewall policy (accept vs drop), and at least one firewall rule, with positive remote acknowledgement (see configurationStatus)</li><li>Device must accept the replacement of /etc/hosts file contents via IoT Hub, with positive remote acknowledgement (see https://learn.microsoft.com/en-us/azure/osconfig/howto-hosts?tabs=portal#the-object-model )</li><li>Device must accept and implement, via IoT Hub, remote reboot</li></ol> Note: Use of other system management toolchains (e.g., Ansible, etc.) by operators is not prohibited, but the device must include the azure-osconfig agent such that it is ready to be managed from Azure.|
411411
|Resources||
412412

413413
---

0 commit comments

Comments
 (0)