You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/certification/program-requirements-edge-secured-core.md
+31-32Lines changed: 31 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
66
66
|Requirements dependency|Only if DMA capable ports exist|
67
67
|Validation Type|Manual/Tools|
68
68
|Validation|If DMA capable external ports exist on the device, toolset to validate that the IOMMU or SMMU is enabled and configured for those ports.|
69
-
|Resources||
69
+
70
70
71
71
---
72
72
</br>
@@ -90,7 +90,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
90
90
|Requirements dependency|UEFI|
91
91
|Validation Type|Manual/Tools|
92
92
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that firmware and kernel signatures are validated every time the device boots. <ul><li>UEFI: Secure boot is enabled</li></ul>|
93
-
|Resources||
93
+
94
94
95
95
---
96
96
</br>
@@ -116,7 +116,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
116
116
|Description|The purpose of the requirement to validate that sensitive data can be encrypted on non-volatile storage.|
117
117
|Validation Type|Manual/Tools|
118
118
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure Secure-boot and BitLocker is enabled and bound to PCR7.|
119
-
|Resources||
119
+
120
120
121
121
---
122
122
</br>
@@ -151,7 +151,7 @@ Validation|Device to be validated through toolset to ensure the device supports
151
151
|Description|The purpose of the requirement is to validate that services listening for input from the network are not running with elevated privileges.|
152
152
|Validation Type|Manual/Tools|
153
153
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that 3rd party services accepting network connections are not running with elevated LocalSystem and LocalService privileges. <ol><li>Exceptions may apply</li></ol>|
154
-
|Resources||
154
+
155
155
156
156
---
157
157
@@ -195,7 +195,7 @@ Some requirements of this program are based on a business agreement between your
195
195
|Requirements dependency||
196
196
|Validation Type|Manual/Tools|
197
197
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
198
-
|Resources||
198
+
199
199
200
200
---
201
201
</br>
@@ -207,7 +207,7 @@ Some requirements of this program are based on a business agreement between your
207
207
|Requirements dependency||
208
208
|Validation Type|Manual/Tools|
209
209
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
210
-
|Resources||
210
+
211
211
212
212
---
213
213
</br>
@@ -218,7 +218,7 @@ Some requirements of this program are based on a business agreement between your
218
218
|Description|The purpose of this policy is to ensure that the device remains secure.|
219
219
|Validation Type|Manual|
220
220
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
221
-
|Resources||
221
+
222
222
223
223
---
224
224
</br>
@@ -229,7 +229,7 @@ Some requirements of this program are based on a business agreement between your
229
229
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
230
230
|Validation Type|Manual|
231
231
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
232
-
|Resources||
232
+
233
233
234
234
---
235
235
</br>
@@ -240,7 +240,7 @@ Some requirements of this program are based on a business agreement between your
240
240
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
241
241
|Validation Type|Manual|
242
242
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
243
-
|Resources||
243
+
244
244
245
245
---
246
246
</br>
@@ -281,7 +281,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
281
281
|Description|The purpose of the requirement is to validate ensure that memory integrity helps protect the device from vulnerable peripherals.|
282
282
|Validation Type|Manual/Tools|
283
283
|Validation|memory regions for peripherals must be gated with hardware/firmware such as memory region domain controllers or SMMU (System memory management Unit).|
284
-
|Resources||
284
+
285
285
286
286
</br>
287
287
@@ -303,7 +303,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
303
303
|Description|The purpose of the requirement is to validate the boot integrity of the device.|
304
304
|Validation Type|Manual/Tools|
305
305
|Validation|Device to be validated through toolset to ensure that firmware and kernel signatures are validated every time the device boots. <ul><li>UEFI: Secure boot is enabled</li><li>Uboot: Verified boot is enabled</li></ul>|
306
-
|Resources||
306
+
307
307
308
308
---
309
309
</br>
@@ -326,7 +326,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
326
326
|Description|The purpose of the requirement to validate the existence of a secure enclave and that the enclave can be used for security functions.|
327
327
|Validation Type|Manual/Tools|
328
328
|Validation||
329
-
|Resources||
329
+
330
330
331
331
## Linux Configuration Requirements
332
332
@@ -337,7 +337,7 @@ Edge Secured-core validation on Linux based devices is executed through a contai
337
337
|Description|The purpose of the requirement to validate that sensitive data can be encrypted on non-volatile storage.|
338
338
|Validation Type|Manual/Tools|
339
339
|Validation|Device to be validated through toolset to ensure storage encryption is enabled and default algorithm is XTS-AES, with key length 128 bits or higher.|
340
-
|Resources||
340
+
341
341
342
342
---
343
343
</br>
@@ -359,7 +359,7 @@ Validation|Device to be validated through toolset to ensure the device supports
359
359
|Description|The purpose of this requirement is to validate that authorized code runs with least privilege.|
360
360
|Validation Type|Manual/Tools|
361
361
|Validation|Device to be validated through toolset to ensure that code integrity is enabled by validating dm-verity and IMA|
362
-
|Resources||
362
+
363
363
364
364
---
365
365
</br>
@@ -370,7 +370,7 @@ Validation|Device to be validated through toolset to ensure the device supports
370
370
|Description|The purpose of the requirement is to validate that applications accepting input from the network are not running with elevated privileges.|
371
371
|Validation Type|Manual/Tools|
372
372
|Validation|Device to be validated through toolset to ensure that services accepting network connections are not running with SYSTEM or root privileges.|
373
-
|Resources||
373
+
374
374
375
375
376
376
## Linux Software/Service Requirements
@@ -393,7 +393,7 @@ Validation|Device to be validated through toolset to ensure the device supports
393
393
|Dependency|azure-osconfig|
394
394
|Validation Type|Manual/Tools|
395
395
|Validation|<ol><li>Device must report, via IoT Hub, its firewall state, firewall fingerprint, ip addresses, network adapter state, host name, hosts file, TPM (absence, or presence with version) and package manager sources (see What can I manage) </li><li>Device must accept the creation, via IoT Hub, of a default firewall policy (accept vs drop), and at least one firewall rule, with positive remote acknowledgement (see configurationStatus)</li><li>Device must accept the replacement of /etc/hosts file contents via IoT Hub, with positive remote acknowledgement (see https://learn.microsoft.com/en-us/azure/osconfig/howto-hosts?tabs=portal#the-object-model )</li><li>Device must accept and implement, via IoT Hub, remote reboot</li></ol> Note: Use of other system management toolchains (e.g., Ansible, etc.) by operators is not prohibited, but the device must include the azure-osconfig agent such that it is ready to be managed from Azure.|
396
-
|Resources||
396
+
397
397
398
398
---
399
399
</br>
@@ -427,7 +427,7 @@ Validation|Device to be validated through toolset to ensure the device supports
427
427
|Description|The purpose of the requirement is to validate that updates must be signed.|
428
428
|Validation Type|Manual/Tools|
429
429
|Validation|Device to be validated through toolset to ensure that updates to the operating system, drivers, application software, libraries, packages and firmware will not be applied unless properly signed and validated.
430
-
|Resources||
430
+
431
431
432
432
433
433
@@ -439,7 +439,7 @@ Validation|Device to be validated through toolset to ensure the device supports
439
439
|Description|The purpose of the requirement is to validate that debug functionality on the device is disabled.|
440
440
|Validation Type|Manual/Tools|
441
441
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
442
-
|Resources||
442
+
443
443
444
444
---
445
445
</br>
@@ -450,7 +450,7 @@ Validation|Device to be validated through toolset to ensure the device supports
450
450
|Description|The purpose of this requirement is to validate the device against two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
451
451
|Validation Type|Manual/Tools|
452
452
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
453
-
|Resources||
453
+
454
454
455
455
---
456
456
</br>
@@ -461,7 +461,7 @@ Validation|Device to be validated through toolset to ensure the device supports
461
461
|Description|The purpose of this policy is to ensure that the device remains secure.|
462
462
|Validation Type|Manual|
463
463
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
464
-
|Resources||
464
+
465
465
466
466
---
467
467
</br>
@@ -472,7 +472,7 @@ Validation|Device to be validated through toolset to ensure the device supports
472
472
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
473
473
|Validation Type|Manual|
474
474
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
475
-
|Resources||
475
+
476
476
477
477
---
478
478
</br>
@@ -483,7 +483,7 @@ Validation|Device to be validated through toolset to ensure the device supports
483
483
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
484
484
|Validation Type|Manual|
485
485
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
486
-
|Resources||
486
+
487
487
488
488
</br>
489
489
::: zone-end
@@ -520,7 +520,7 @@ Additional considerations for Azure Sphere are provided as an application note h
520
520
|Description|The purpose of the requirement is to ensure that memory integrity helps protect the device from vulnerable peripherals.|
521
521
|Validation Type|Automated|
522
522
|Validation|Provided by Microsoft|
523
-
|Resources||
523
+
524
524
525
525
</br>
526
526
@@ -531,7 +531,7 @@ Additional considerations for Azure Sphere are provided as an application note h
531
531
|Description|The purpose of the requirement is to ensure that device has adequate mitigations from Firmware security threats.|
532
532
|Validation Type|Automated|
533
533
|Validation|Provided by Microsoft|
534
-
|Resources||
534
+
535
535
536
536
---
537
537
</br>
@@ -542,7 +542,7 @@ Additional considerations for Azure Sphere are provided as an application note h
542
542
|Description|The purpose of the requirement is to validate the boot integrity of the device.|
543
543
|Validation Type|Automated|
544
544
|Validation|Provided by Microsoft|
545
-
|Resources||
545
+
546
546
547
547
---
548
548
</br>
@@ -553,7 +553,7 @@ Additional considerations for Azure Sphere are provided as an application note h
553
553
|Description|The purpose of the requirement is to ensure the device can remotely attest to the Microsoft Azure Attestation service.|
554
554
|Validation Type|Automated|
555
555
|Validation|Provided by Microsoft|
556
-
|Resources||
556
+
557
557
558
558
---
559
559
</br>
@@ -564,7 +564,6 @@ Additional considerations for Azure Sphere are provided as an application note h
564
564
|Description|The purpose of this reqiurement is to validate hardware security that is accessible from a secure operating system.|
565
565
|Validation Type|Automated|
566
566
|Validation|Provided by Microsoft|
567
-
|Resources||
568
567
569
568
## Sphere OS Configuration Requirements
570
569
@@ -679,7 +678,7 @@ Additional considerations for Azure Sphere are provided as an application note h
679
678
|Description|The purpose of the policy requires that debug functionality on the device is disabled.|
680
679
|Validation Type|Manual/Tools|
681
680
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
682
-
|Resources||
681
+
683
682
684
683
---
685
684
</br>
@@ -690,7 +689,7 @@ Additional considerations for Azure Sphere are provided as an application note h
690
689
|Description|The policy requires that the device can execute two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
691
690
|Validation Type|Manual/Tools|
692
691
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
693
-
|Resources||
692
+
694
693
695
694
---
696
695
</br>
@@ -701,7 +700,7 @@ Additional considerations for Azure Sphere are provided as an application note h
701
700
|Description|The purpose of this policy is to ensure that the device remains secure.|
702
701
|Validation Type|Manual|
703
702
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
704
-
|Resources||
703
+
705
704
706
705
---
707
706
</br>
@@ -712,7 +711,7 @@ Additional considerations for Azure Sphere are provided as an application note h
712
711
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
713
712
|Validation Type|Manual|
714
713
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
715
-
|Resources||
714
+
716
715
717
716
---
718
717
</br>
@@ -723,7 +722,7 @@ Additional considerations for Azure Sphere are provided as an application note h
723
722
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
724
723
|Validation Type|Manual|
725
724
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
0 commit comments