{"id":90034,"date":"2019-10-21T08:00:56","date_gmt":"2019-10-21T15:00:56","guid":{"rendered":""},"modified":"2025-06-29T23:51:33","modified_gmt":"2025-06-30T06:51:33","slug":"microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/","title":{"rendered":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Recent developments in security research and real-world attacks demonstrate that as more protections are proactively built into the OS and in connected services, attackers are looking for other avenues of exploitation with firmware emerging as a top target. In the last three years alone, NIST\u2019s National Vulnerability Database has shown nearly a five-fold increase in the number of firmware vulnerabilities discovered.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To combat threats specifically targeted at the firmware and operating system levels, we\u2019re announcing a new initiative we\u2019ve been working on with partners to design what we call Secured-core PCs. These devices, created in partnership with our PC manufacturing and silicon partners, meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer, or the device core, that underpins the Windows operating system. These devices are designed specifically for industries like financial services, government and healthcare, and for workers that handle highly-sensitive IP, customer or personal data, including PII as these are higher value targets for nation-state attackers.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"559\" height=\"319\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/10\/fig1-number-of-vulnerabilities.png\" alt=\"\" class=\"wp-image-90035\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig1-number-of-vulnerabilities.png 559w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig1-number-of-vulnerabilities-300x171.png 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In late 2018, security researchers discovered that hacking group, Strontium has been using firmware vulnerabilities to target systems in the wild with malware delivered through a firmware attack. As a result, the malicious code was hard to detect and difficult to remove \u2013 it could persist even across common cleanup procedures like an OS re-install or a hard drive replacement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-attackers-and-researchers-are-devoting-more-effort-toward-firmware\">Why attackers and researchers are devoting more effort toward firmware<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Firmware is used to initialize the hardware and other software on the device and has a higher level of access and privilege than the hypervisor and operating system kernel thereby making it an attractive target for attackers. Attacks targeting firmware can undermine mechanisms like secure boot and other security functionality implemented by the hypervisor or operating system making it more difficult to identify when a system or user has been compromised. Compounding the problem is the fact that endpoint protection and detection solutions have limited visibility at the firmware layer given that they run underneath of the operating system, making evasion easier for attackers going after firmware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-makes-a-secured-core-pc\">What makes a Secured-core PC?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Secured-core PCs combine identity, virtualization, operating system, hardware and firmware protection to add another layer of security underneath the operating system. Unlike software-only security solutions, Secured-core PCs are designed to prevent these kinds of attacks rather than simply detecting them. Our investments in Windows Defender System Guard and Secured-core PC devices are designed to provide the rich ecosystem of Windows 10 devices with uniform assurances around the integrity of the launched operating system and verifiable measurements of the operating system launch to help mitigate against threats taking aim at the firmware layer. These requirements enable customers to boot securely, protect the device from firmware vulnerabilities, shield the operating system from attacks, prevent unauthorized access to devices and data, and ensure that identity and domain credentials are protected.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The built-in measurements can be used by SecOps and IT admins to remotely monitor the health of their systems using System Guard runtime attestation and implement a zero-trust network rooted in hardware. This advanced firmware security works in concert with other Windows features to ensure that Secured-core PCs provide comprehensive protections against modern threats.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1667\" height=\"614\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/10\/fig-2-secured-core-pc.png\" alt=\"\" class=\"wp-image-90036\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig-2-secured-core-pc.png 1667w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig-2-secured-core-pc-300x110.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig-2-secured-core-pc-768x283.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig-2-secured-core-pc-1024x377.png 1024w\" sizes=\"auto, (max-width: 1667px) 100vw, 1667px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"removing-trust-from-the-firmware\">Removing trust from the firmware<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Starting with Windows 8, we introduced&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/oem-secure-boot\">Secure Boot<\/a>&nbsp;to mitigate the risk posed by malicious bootloaders and rootkits that relied on Unified Extensible Firmware Interface (UEFI) firmware to only allow properly signed bootloaders like the Windows boot manager to execute. This was a significant step forward to protect against these specific types of attacks. However, since firmware is already trusted to verify the bootloaders, Secure Boot on its own does not protect from threats that exploit vulnerabilities in the trusted firmware. That\u2019s why we worked with our partners to ensure these new Secured-core capabilities are shipped in devices right out of the box.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Using new hardware capabilities from&nbsp;<a href=\"https:\/\/community.amd.com\/community\/amd-business\/blog\/2019\/10\/21\/amd-and-microsoft-secured-core-pc\">AMD<\/a>,&nbsp;<a href=\"https:\/\/itpeernetwork.intel.com\/foundational-pc-protection-for-the-changing-security-landscape\/\">Intel<\/a>, and Qualcomm, Windows 10 now implements&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-system-guard\/system-guard-how-hardware-based-root-of-trust-helps-protect-windows\">System Guard Secure Launch<\/a>&nbsp;as a key Secured-core PC device requirement to protect the boot process from firmware attacks. System Guard uses the Dynamic Root of Trust for Measurement (DRTM) capabilities that are built into the latest silicon from AMD, Intel, and Qualcomm to enable the system to leverage firmware to start the hardware and then shortly after re-initialize the system into a trusted state by using the OS boot loader and processor capabilities to send the system down a well-known and verifiable code path. This mechanism helps limit the trust assigned to firmware and provides powerful mitigation against cutting-edge, targeted threats against firmware. This capability also helps to protect the integrity of the virtualization-based security (VBS) functionality implemented by the hypervisor from firmware compromise. VBS then relies on the hypervisor to isolate sensitive functionality from the rest of the OS which helps to protect the VBS functionality from malware that may have infected the normal OS even with elevated privileges. Protecting VBS is critical since it is used as a building block for important OS security capabilities like Windows Defender Credential Guard which protects against malware maliciously using OS credentials and Hypervisor-protected Code Integrity (HVCI) which ensures that a strict code integrity policy is enforced and that all kernel code is signed and verified.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"530\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/10\/fig3-secure-launch.jpg\" alt=\"image\" class=\"wp-image-90037\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig3-secure-launch.jpg 1200w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig3-secure-launch-300x133.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig3-secure-launch-768x339.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/fig3-secure-launch-1024x452.jpg 1024w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Being able to measure that the device booted securely is another critical piece of this additional layer of protection from firmware compromise that gives admins added confidence that their endpoints are safe. That\u2019s why we implemented Trusted Platform Module 2.0 (TPM) as one of the device requirements for Secured-core PCs. By using the Trusted Platform Module 2.0 (TPM) to measure the components that are used during the secure launch process, we help customers enable&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/06\/14\/building-zero-trust-networks-with-microsoft-365\/\">zero trust networks<\/a>&nbsp;using System Guard runtime attestation. Conditional access policies can be implemented based on the reports provided by the System Guard attestation client running in the isolated VBS environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to the Secure Launch functionality, Windows implements additional safeguards that operate when the OS is running to monitor and restrict the functionality of potentially dangerous firmware functionality accessible through System Management Mode (SMM).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond the hardware protection of firmware featured in Secured-core PCs, Microsoft recommends a defense-in-depth approach including security review of code,&nbsp;<a href=\"https:\/\/docs.microsoft.com\/windows-hardware\/drivers\/bringup\/windows-uefi-firmware-update-platform\">automatic updates<\/a>, and attack surface reduction. Microsoft has provided an open-source firmware project called&nbsp;<a href=\"https:\/\/microsoft.github.io\/mu\/\">Project-Mu<\/a>&nbsp;that PC manufactures can use as a starting point for secure firmware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-get-a-secured-core-pc\">How to get a Secured-core PC<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our ecosystem partnerships have enabled us to add this additional layer of security in devices that are designed for highly-targeted industries and end-users who handle mission-critical data in some of the most data-sensitive industries like government, financial services, and healthcare, right-out-of-the-box. These innovations build on the value of Windows 10 Pro that comes with built-in protections like firewall, secure boot, and file-level information-loss protection which are standard on every device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">More information on devices that are verified Secured-core PC including those from Dell, Dynabook, HP,&nbsp;<a href=\"https:\/\/news.lenovo.com\/foundational-engineering-security-legacy-meets-user-centered-design\">Lenovo<\/a>, Panasonic and Surface can be found on our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows10-secured-core-computers\">web page<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>David Weston (<a href=\"https:\/\/twitter.com\/dwizzzleMSFT\">@dwizzzleMSFT<\/a>)<\/em><br><em>Partner Director, OS Security<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.<\/p>\n","protected":false},"author":68,"featured_media":90041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3898,3822],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[],"topic":[3670,3688],"coauthors":[2185],"class_list":["post-90034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-elevation-of-privilege","tag-microsoft-security-insights","content-type-news","topic-device-management","topic-threat-trends","review-flag-2-1694638266-864","review-flag-8-1694638266-352","review-flag-lever-1694638263-909","review-flag-new-1694638263-340","review-flag-partn-1694638263-177","review-flag-partn-1694638263-597"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-21T15:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T06:51:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Weston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-social.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Weston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/david-weston\/\",\"@type\":\"Person\",\"@name\":\"David Weston\"}],\"headline\":\"Microsoft and partners design new device security requirements to protect against targeted firmware attacks\",\"datePublished\":\"2019-10-21T15:00:56+00:00\",\"dateModified\":\"2025-06-30T06:51:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\"},\"wordCount\":1189,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png\",\"keywords\":[\"Elevation of privilege\",\"Microsoft Security Insights\"],\"articleSection\":[\"Cybersecurity\",\"Microsoft security intelligence\",\"Security Development\",\"Windows Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\",\"name\":\"Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png\",\"datePublished\":\"2019-10-21T15:00:56+00:00\",\"dateModified\":\"2025-06-30T06:51:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png\",\"width\":440,\"height\":268},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft and partners design new device security requirements to protect against targeted firmware attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98\",\"name\":\"Microsoft Security Threat Intelligence - Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence - Editor\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog","og_description":"We\u2019ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-10-21T15:00:56+00:00","article_modified_time":"2025-06-30T06:51:33+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-social.png","type":"image\/png"}],"author":"David Weston","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-social.png","twitter_misc":{"Written by":"David Weston","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/david-weston\/","@type":"Person","@name":"David Weston"}],"headline":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks","datePublished":"2019-10-21T15:00:56+00:00","dateModified":"2025-06-30T06:51:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/"},"wordCount":1189,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png","keywords":["Elevation of privilege","Microsoft Security Insights"],"articleSection":["Cybersecurity","Microsoft security intelligence","Security Development","Windows Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/","name":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png","datePublished":"2019-10-21T15:00:56+00:00","dateModified":"2025-06-30T06:51:33+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/secure-core-pc-blog-river.png","width":440,"height":268},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98","name":"Microsoft Security Threat Intelligence - Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2","url":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence - Editor"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90034"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90034\/revisions"}],"predecessor-version":[{"id":140734,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90034\/revisions\/140734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90041"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90034"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=90034"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90034"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90034"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=90034"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=90034"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90034"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}