Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
Case Study
January 22, 2019

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

When a global manufacturer of secure systems in the aerospace and defense industry began developing a new computing solution designed to mitigate modern cybersecurity threats, it was aware of the many challenges it would face while evaluating hardware and software components. The company sought a commercial off-the-shelf (COTS) 3U VPX single-board computer (SBC) with a robust and proven security profile upon which to build its Trusted Computing solution, a processor board that would provide a fully protected Root of Trust-based boot process and extends this trust to its hardened Red Hat Linux operating system and application software.

Ultimately, this Trusted Computing solution would be developed specifically to meet stringent security requirements and be tested by a prominent intelligence agency in order to receive its prestigious security certification, a recognition that would approve the solution for use in secure environments on a variety of platforms. In order to achieve this highly valuable certification, the company would need to perform rigorous security hardening of the board, followed by security vulnerability analysis and penetration testing on all hardware and software components, knowing the intelligence agency would perform similar testing to an even higher degree of scrutiny before awarding the certification.

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

In addition to meeting these critical security requirements, suppliers would be evaluated on their ability to demonstrate a truly trusted supply chain with processes in place for manufacturing security, component supply chain integrity, and counterfeit parts mitigation, among others. As well, it was important for all technology to make it through the thorough security certification process and still offer a lucrative useful life and period of market availability. For this reason, all hardware components were evaluated on their ability to offer a long and stable lifecycle, as well as their supplier’s support to combat obsolescence.

Download the case study to learn more.

Introduction to COTS-based Trusted Computing

This is the first of an ongoing series of papers that address the use of open standards based COTS technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications. What do we mean by Trusted Computing? Read the paper.

Reducing Program Risk with Dependable Solutions

Ultimately, mission success depends on every module, subsystem, and system on every platform performing exactly as designed under the harshest conditions while ensuring that critical data is secure and protected. Data acquisition and management, signal processing, mission computing, communications, networking, and equipment handling and stabilization must all be rugged, reliable, robust, and ready for any situation. Learn more in this white paper