US Policymakers’ Research Foundation Calls Out the Need to Drive Firmware Security in Standards and Regulations

US Policymakers’ Research Foundation Calls Out the Need to Drive Firmware Security in Standards and Regulations

Firmware Security, Tech Blog

Thomas McCarthy

Thomas McCarthy

Product Marketing

Firmware is all around us – from your car to airport kiosks and power grids, nearly all technology is powered by firmware, and that firmware is vulnerable to cyberattacks. Because of this, firmware attacks are on the rise and can be much more dangerous than Operating System (OS) attacks because the firmware is invisible to OS-based security solutions. Through firmware vulnerabilities, cybercriminals can take control of a device and use it as a gateway to navigate into the IT infrastructure and cause financial and reputational damages to organizations in both the public and private sectors.

Firmware security took a giant leap forward on January 25, 2024 in a memo posted by the Foundation for Defense of Democracies (FDD), a non-partisan US-based research institute tasked with helping to direct policymakers to better protect our national security.  Titled “The Missing Middle: Addressing the Absence of Firmware Security”, firmware is highlighted to be “code that lies at the foundation of billions of devices in the United States alone” and providing hackers, “more ‘bang for the buck’ than some software attacks.

This research memo begins with a reminder of how satellite internet router firmware was disabled throughout Ukraine, enabling the Russian invasion in 2022. It further goes on to describe the role firmware plays in different devices, the vulnerabilities firmware possesses, and how it is being overlooked in current government-sponsored and standards body cyber security initiatives. The paper concludes with several specific recommendations for government and standards bodies, with incentives to better secure firmware.

The recommendations put forth in the FDD memo align with AMI’s vision for Zero Trust Firmware and the 6 Fundamentals of Firmware Security:

  1. Secure by Design Firmware – Secure system designs and firmware upgrade capabilities in data centers result in enhanced security from system inception to vulnerabilities.
  2. Deep Firmware Experience – Secure coding requires massive experience in firmware development and deployment through the compute supply chain.
  3. Active Industry Participation – Closely connected security threat ecosystem that includes collaborative research and vulnerability sharing.
  4. Continuous Vulnerability Testing – Need for a test infrastructure with automatic and continuous vulnerability testing.
  5. Ability to Secure Open Source – Open source requires close monitoring and accountability for repairing and disclosing security vulnerabilities.
  6. Proactive Industry Communication – Disciplined approach to communicating vulnerabilities and remediation.

The FDD memo is currently being covered in multiple publications and will be submitted as a Request for Information (RFI) for CISA’s “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software.” As initiatives like CSC 2.0 help to drive stronger standards and regulations for firmware security, AMI is poised to lead the efforts to comply.

 

 

About AMI

AMI is Firmware Reimagined for modern computing. As a global leader in Dynamic Firmware for security, orchestration, and manageability solutions, AMI enables the world’s compute platforms from on-premises to the cloud to the edge. AMI’s industry-leading foundational technology and unwavering customer support have generated lasting partnerships and spurred innovation for some of the most prominent brands in the high-tech industry. 

You May Also Like…