You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Description|The purpose of the requirement is to ensure that device has adequate mitigations from Firmware security threats.|
81
-
|Target Availability|2022|
82
80
|Requirements dependency|DRTM + UEFI|
83
81
|Validation Type|Manual/Tools|
84
82
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to confirm it is protected from firmware security threats through one of the following approaches: <ul><li>DRTM + UEFI Management Mode mitigations</li><li>DRTM + UEFI Management Mode hardening</li></ul> |
@@ -89,9 +87,8 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
|Description|The purpose of the requirement is to validate the boot integrity of the device.|
94
-
|Target Availability|2022|
95
92
|Requirements dependency|UEFI|
96
93
|Validation Type|Manual/Tools|
97
94
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that firmware and kernel signatures are validated every time the device boots. <ul><li>UEFI: Secure boot is enabled</li></ul>|
@@ -102,9 +99,8 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
|Validation|Device to be validated through toolset to ensure that platform boot logs and measurements of boot activity can be collected and remotely attested to the Microsoft Azure Attestation service.|
@@ -118,9 +114,8 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
|Description|The purpose of the requirement to validate that sensitive data can be encrypted on non-volatile storage.|
123
-
|Target Availability|2022|
124
119
|Validation Type|Manual/Tools|
125
120
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure Secure-boot and BitLocker is enabled and bound to PCR7.|
126
121
|Resources||
@@ -130,9 +125,8 @@ Edge Secured-core for Windows IoT requires Windows 10 IoT Enterprise version 190
130
125
131
126
|Name|SecuredCore.Encryption.TLS|x86/AMD64|Arm64|
132
127
|:---|:---|:---|:---|
133
-
|Status|Required|
128
+
|Status|Required|2023|2023|
134
129
|Description|The purpose of the requirement is to validate support for required TLS versions and cipher suites.|
135
-
|Target Availability|2022|
136
130
|Requirements dependency|Windows 10 IoT Enterprise Version 1903 or greater. Note: other requirements may require greater versions for other services. |
137
131
|Validation Type|Manual/Tools|
138
132
Validation|Device to be validated through toolset to ensure the device supports a minimum TLS version of 1.2 and supports the following required TLS cipher suites.<ul><li>TLS_RSA_WITH_AES_128_GCM_SHA256</li><li>TLS_RSA_WITH_AES_128_CBC_SHA256</li><li>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</li><li>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</li><li>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</li><li>TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256</li><li>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</li></ul>|
@@ -143,9 +137,8 @@ Validation|Device to be validated through toolset to ensure the device supports
|Description|The purpose of this test is to validate that code integrity is available on this device.|
148
-
|Target Availability|2022|
149
142
|Requirements dependency|HVCI is enabled on the device.|
150
143
|Validation Type|Manual/Tools|
151
144
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that HVCI is enabled on the device.|
@@ -156,9 +149,8 @@ Validation|Device to be validated through toolset to ensure the device supports
|Description|The purpose of the requirement is to validate that services listening for input from the network are not running with elevated privileges.|
161
-
|Target Availability|2022|
162
154
|Validation Type|Manual/Tools|
163
155
|Validation|Device to be validated through [Edge Secured-core Agent](https://aka.ms/Scforwiniot) toolset to ensure that 3rd party services accepting network connections are not running with elevated LocalSystem and LocalService privileges. <ol><li>Exceptions may apply</li></ol>|
164
156
|Resources||
@@ -171,7 +163,7 @@ Validation|Device to be validated through toolset to ensure the device supports
|Description|The purpose of the requirement is to make sure devices can report security information and events by sending data to Azure Defender for IoT. <br>Note: Download and deploy security agent from GitHub|
176
168
|Target Availability|2022|
177
169
|Validation Type|Manual/Tools|
@@ -183,7 +175,7 @@ Validation|Device to be validated through toolset to ensure the device supports
|Description|The purpose of the requirement is to validate that the system conforms to a baseline security configuration.|
188
180
|Target Availability|2022|
189
181
|Requirements dependency|Azure Defender for IoT|
@@ -202,7 +194,6 @@ Some requirements of this program are based on a business agreement between your
202
194
|:---|:---|
203
195
|Status|Required|
204
196
|Description|The purpose of the requirement is to validate that debug functionality on the device is disabled.|
205
-
|Target Availability|2022|
206
197
|Requirements dependency||
207
198
|Validation Type|Manual/Tools|
208
199
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
@@ -215,7 +206,6 @@ Some requirements of this program are based on a business agreement between your
215
206
|:---|:---|
216
207
|Status|Required|
217
208
|Description|The purpose of this test is to validate the device against two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
218
-
|Target Availability|2022|
219
209
|Requirements dependency||
220
210
|Validation Type|Manual/Tools|
221
211
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
@@ -228,7 +218,6 @@ Some requirements of this program are based on a business agreement between your
228
218
|:---|:---|
229
219
|Status|Required|
230
220
|Description|The purpose of this policy is to ensure that the device remains secure.|
231
-
|Target Availability|2022|
232
221
|Validation Type|Manual|
233
222
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
234
223
|Resources||
@@ -240,7 +229,6 @@ Some requirements of this program are based on a business agreement between your
240
229
|:---|:---|
241
230
|Status|Required|
242
231
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
243
-
|Target Availability|2022|
244
232
|Validation Type|Manual|
245
233
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
246
234
|Resources||
@@ -252,7 +240,6 @@ Some requirements of this program are based on a business agreement between your
252
240
|:---|:---|
253
241
|Status|Required|
254
242
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
255
-
|Target Availability|2022|
256
243
|Validation Type|Manual|
257
244
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
258
245
|Resources||
@@ -280,9 +267,9 @@ Edge Secured-core validation on Linux based devices is executed through a contai
|Validation|Device to be validated through toolset to ensure that the device has a HWRoT present and that it can be provisioned through DPS using TPM or SE.|||
288
275
|Resources|[Setup auto provisioning with DPS](../iot-dps/quick-setup-auto-provision.md)|||
@@ -452,7 +439,6 @@ Validation|Device to be validated through toolset to ensure the device supports
452
439
|:---|:---|
453
440
|Status|Required|
454
441
|Description|The purpose of the requirement is to validate that debug functionality on the device is disabled.|
455
-
|Target Availability|2022|
456
442
|Validation Type|Manual/Tools|
457
443
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
458
444
|Resources||
@@ -464,7 +450,6 @@ Validation|Device to be validated through toolset to ensure the device supports
464
450
|:---|:---|
465
451
|Status|Required|
466
452
|Description|The purpose of this test is to validate the device against two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
467
-
|Target Availability|2022|
468
453
|Validation Type|Manual/Tools|
469
454
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
470
455
|Resources||
@@ -476,7 +461,6 @@ Validation|Device to be validated through toolset to ensure the device supports
476
461
|:---|:---|
477
462
|Status|Required|
478
463
|Description|The purpose of this policy is to ensure that the device remains secure.|
479
-
|Target Availability|2022|
480
464
|Validation Type|Manual|
481
465
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
482
466
|Resources||
@@ -488,7 +472,6 @@ Validation|Device to be validated through toolset to ensure the device supports
488
472
|:---|:---|
489
473
|Status|Required|
490
474
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
491
-
|Target Availability|2022|
492
475
|Validation Type|Manual|
493
476
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
494
477
|Resources||
@@ -500,7 +483,6 @@ Validation|Device to be validated through toolset to ensure the device supports
500
483
|:---|:---|
501
484
|Status|Required|
502
485
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
503
-
|Target Availability|2022|
504
486
|Validation Type|Manual|
505
487
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
506
488
|Resources||
@@ -517,7 +499,7 @@ The Mediatek MT3620AN must be included in your design. For any component that ca
517
499
518
500
All operating systems on device must meet Secured Core requirements
519
501
520
-
Additional considerations for Azure Sphere are provided as an application note here: [Azure Sphere application notes](https://learn.microsoft.com/azure-sphere/app-notes/app-notes-overview)
502
+
Additional considerations for Azure Sphere are provided as an application note here: [Azure Sphere application notes](../../azure-sphere/app-notes/app-notes-overview)
521
503
522
504
523
505
## Sphere Hardware/Firmware Requirements
@@ -597,7 +579,7 @@ Additional considerations for Azure Sphere are provided as an application note h
597
579
|Description|The purpose of this reqiurement is to validate that sensitive data can be encrypted on non-volatile storage.|
598
580
|Validation Type|Automated|
599
581
|Validation|Provided by Microsoft|
600
-
|Resources|[Data at rest protection on Azure Sphere](../azure-sphere/app-notes/app-notes-overview)|
582
+
|Resources|[Data at rest protection on Azure Sphere](../../azure-sphere/app-notes/app-notes-overview)|
601
583
602
584
---
603
585
</br>
@@ -652,7 +634,7 @@ Additional considerations for Azure Sphere are provided as an application note h
652
634
|Description|The purpose of the requirement is to make sure devices can report security information and events by sending data to Azure Defender for IoT. <br>Note: Download and deploy security agent from GitHub|
653
635
|Validation Type|Automated|
654
636
|Validation|Provided by Microsoft|
655
-
|Resources|[Collect and interpret error data - Azure Sphere](../azure-sphere/deployment/interpret-error-data?tabs=cliv2beta)</br>[Configure crash dumps - Azure Sphere](../azure-sphere/deployment/configure-crash-dumps)|
637
+
|Resources|[Collect and interpret error data - Azure Sphere](../../azure-sphere/deployment/interpret-error-data?tabs=cliv2beta)</br>[Configure crash dumps - Azure Sphere](../../azure-sphere/deployment/configure-crash-dumps)|
656
638
657
639
---
658
640
</br>
@@ -707,8 +689,7 @@ Additional considerations for Azure Sphere are provided as an application note h
707
689
|Name|SecuredCore.Policy.Protection.Debug|
708
690
|:---|:---|
709
691
|Status|Required|
710
-
|Description|The purpose of the requirement is to validate that debug functionality on the device is disabled.|
711
-
|Target Availability|2022|
692
+
|Description|The purpose of the policy requires that debug functionality on the device is disabled.|
712
693
|Validation Type|Manual/Tools|
713
694
|Validation|Device to be validated through toolset to ensure that debug functionality requires authorization to enable.|
714
695
|Resources||
@@ -719,8 +700,7 @@ Additional considerations for Azure Sphere are provided as an application note h
719
700
|Name|SecuredCore.Policy.Manageability.Reset|
720
701
|:---|:---|
721
702
|Status|Required|
722
-
|Description|The purpose of this test is to validate the device against two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
723
-
|Target Availability|2022|
703
+
|Description|The policy requires that the device can execute two use cases: a) Ability to perform a reset (remove user data, remove user configs), b) Restore device to last known good in the case of an update causing issues.|
724
704
|Validation Type|Manual/Tools|
725
705
|Validation|Device to be validated through a combination of toolset and submitted documentation that the device supports this functionality. The device manufacturer can determine whether to implement these capabilities to support remote reset or only local reset.|
726
706
|Resources||
@@ -732,7 +712,6 @@ Additional considerations for Azure Sphere are provided as an application note h
732
712
|:---|:---|
733
713
|Status|Required|
734
714
|Description|The purpose of this policy is to ensure that the device remains secure.|
735
-
|Target Availability|2022|
736
715
|Validation Type|Manual|
737
716
|Validation|Commitment from submission that devices certified will be required to keep devices up to date for 60 months from date of submission. Specifications available to the purchaser and devices itself in some manner should indicate the duration for which their software will be updated.|
738
717
|Resources||
@@ -744,7 +723,6 @@ Additional considerations for Azure Sphere are provided as an application note h
744
723
|:---|:---|
745
724
|Status|Required|
746
725
|Description|The purpose of this policy is to ensure that there is a mechanism for collecting and distributing reports of vulnerabilities in the product.|
747
-
|Target Availability|2022|
748
726
|Validation Type|Manual|
749
727
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
750
728
|Resources||
@@ -756,7 +734,6 @@ Additional considerations for Azure Sphere are provided as an application note h
756
734
|:---|:---|
757
735
|Status|Required|
758
736
|Description|The purpose of this policy is to ensure that vulnerabilities that are high/critical (using CVSS 3.0) are addressed within 180 days of the fix being available.|
759
-
|Target Availability|2022|
760
737
|Validation Type|Manual|
761
738
|Validation|Documentation on the process for submitting and receiving vulnerability reports for the certified devices will be reviewed.|
0 commit comments