Skip to content

Commit 8c18495

Browse files
committed
minor win fixes
1 parent 4d51e8f commit 8c18495

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

articles/certification/program-requirements-edge-secured-core.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,8 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
4848

4949
|Name|SecuredCore.Hardware.Identity|x86/AMD64|Arm64|
5050
|:---|:---|:---|:---|
51-
|Status|Required|
51+
|Status|Required|2023|2024|
5252
|Description|The purpose of the requirement is to validate the device identity is rooted in hardware and can be the primary authentication method with Azure IoT Hub Device Provisioning Service (DPS).|
53-
|Target Availability|2022|
5453
|Requirements dependency|TPM v2.0 device|
5554
|Validation Type|Manual/Tools|
5655
|Validation|Devices will be enrolled to DPS using the TPM authentication mechanism during testing.|
@@ -61,7 +60,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
6160

6261
|Name|SecuredCore.Hardware.MemoryProtection|x86/AMD64|Arm64|
6362
|:---|:---|:---|:---|
64-
|Status|Required|2023|2023|
63+
|Status|Required|2023|2024|
6564
|Description|The purpose of the requirement is to validate that DMA is not enabled on externally accessible ports.|
6665
|Requirements dependency|Only if DMA capable ports exist|
6766
|Validation Type|Manual/Tools|
@@ -73,7 +72,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
7372

7473
|Name|SecuredCore.Firmware.Protection|x86/AMD64|Arm64|
7574
|:---|:---|:---|:---|
76-
|Status|Required|2023|2023|
75+
|Status|Required|2023|2024|
7776
|Description|The purpose of the requirement is to ensure that device has adequate mitigations from Firmware security threats.|
7877
|Requirements dependency|DRTM + UEFI|
7978
|Validation Type|Manual/Tools|
@@ -85,7 +84,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
8584

8685
|Name|SecuredCore.Firmware.SecureBoot|x86/AMD64|Arm64|
8786
|:---|:---|:---|:---|
88-
|Status|Required|2023|2023|
87+
|Status|Required|2023|2024|
8988
|Description|The purpose of the requirement is to validate the boot integrity of the device.|
9089
|Requirements dependency|UEFI|
9190
|Validation Type|Manual/Tools|
@@ -97,7 +96,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
9796

9897
|Name|SecuredCore.Firmware.Attestation|x86/AMD64|Arm64|
9998
|:---|:---|:---|:---|
100-
|Status|Required|2023|2023|
99+
|Status|Required|2023|2024|
101100
|Description|The purpose of the requirement is to ensure the device can remotely attest to the Microsoft Azure Attestation service.|
102101
|Requirements dependency|Azure Attestation Service|
103102
|Validation Type|Manual/Tools|
@@ -112,7 +111,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
112111

113112
|Name|SecuredCore.Encryption.Storage|x86/AMD64|Arm64|
114113
|:---|:---|:---|:---|
115-
|Status|Required|2023|2023|
114+
|Status|Required|2023|2024|
116115
|Description|The purpose of the requirement to validate that sensitive data can be encrypted on non-volatile storage.|
117116
|Validation Type|Manual/Tools|
118117
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure Secure-boot and BitLocker is enabled and bound to PCR7.|
@@ -123,7 +122,7 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
123122

124123
|Name|SecuredCore.Encryption.TLS|x86/AMD64|Arm64|
125124
|:---|:---|:---|:---|
126-
|Status|Required|2023|2023|
125+
|Status|Required|2023|2024|
127126
|Description|The purpose of the requirement is to validate support for required TLS versions and cipher suites.|
128127
|Requirements dependency|Windows 10 IoT Enterprise Version 1903 or greater. Note: other requirements may require greater versions for other services. |
129128
|Validation Type|Manual/Tools|
@@ -135,7 +134,7 @@ Validation|Device to be validated through toolset to ensure the device supports
135134

136135
|Name|SecuredCore.Protection.CodeIntegrity|x86/AMD64|Arm64|
137136
|:---|:---|:---|:---|
138-
|Status|Required|2023|2023|
137+
|Status|Required|2023|2024|
139138
|Description|The purpose of this requirement is to validate that code integrity is available on this device.|
140139
|Requirements dependency|HVCI is enabled on the device.|
141140
|Validation Type|Manual/Tools|
@@ -147,7 +146,7 @@ Validation|Device to be validated through toolset to ensure the device supports
147146

148147
|Name|SecuredCore.Protection.NetworkServices|x86/AMD64|Arm64|
149148
|:---|:---|:---|:---|
150-
|Status|Required|2023|2023|
149+
|Status|Required|2023|2024|
151150
|Description|The purpose of the requirement is to validate that services listening for input from the network are not running with elevated privileges.|
152151
|Validation Type|Manual/Tools|
153152
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that 3rd party services accepting network connections are not running with elevated LocalSystem and LocalService privileges. <ol><li>Exceptions may apply</li></ol>|

0 commit comments

Comments
 (0)