Raw Attestation with Secure-Boot
Last updated
Last updated
Secure-Boot itself is a standalone component of the UEFI stack that is designed to protect the pre-boot process. It therefore contains a list of binaries that are allowed to run during the boot process. As the Raw Attestation only protects the firmware and the initial platform configuration this can be seen as the next step in securing the platform. In a first step the Raw Attestation measures the firmware which includes the UEFI Secure-Boot component. Afterwards the boot process continues and the measurements stored for Secure-Boot are compared with the taken measurements. An attesting party can be sure that when the measurements of the firmware retrieved via the Raw Attestation process are correct that also Secure-Boot has been executed successfully. Subsequently the complete boot process including the kernel have been secured and it is possible to detect the manipulation of the boot process.