Course Outline
- BMC Threat Model for government
- Attack Surface of Server BMCs for government
- Common Vulnerabilities in Legacy BMC Firmware for government
- OpenBMC Security Architecture Overview for government
- Compliance Requirements (NIST, PCI-DSS) for government
Secure Boot for government
- U-Boot Verified Boot Chain for government
- Image Signing with RSA and ECDSA for government
- Key Hierarchy and Revocation for government
- Measurement and Attestation Basics for government
Firmware Update Security for government
- Image Signature Verification Flow for government
- Rollback Protection and Version Policies for government
- Dual-Bank Update Strategies for government
- Code Update via Redfish and IPMI for government
Certificate Management for government
- Phosphor-Certificate-Manager Architecture for government
- Installing and Replacing HTTPS Certificates for government
- Certificate Authority (CA) Trust Stores for government
- LDAPS and Client Certificate Authentication for government
Authentication and Authorization for government
- Local User Management and Password Policies for government
- LDAP and Active Directory Integration for government
- PAM Stack Configuration for government
- Redfish RBAC and Privilege Mapping for government
Network Security for government
- Firewall Rules and nftables for government
- TLS 1.3 Configuration in bmcweb for government
- SSH Hardening and Key-Based Authentication for government
- Network Segmentation for BMC Interfaces for government
Audit and Response for government
- Remote Syslog Configuration for government
- Security Event Logging for government
- SEL and Audit Trail Management for government
- Incident Response for Compromised BMCs for government
Security Testing for government
- Static Analysis with CodeQL and Bandit for government
- Fuzzing D-Bus Interfaces for government
- Penetration Testing REST and Redfish APIs for government
- CVE Tracking and Patch Management for government
Requirements
- Comprehensive understanding of Public Key Infrastructure (PKI) and Transport Layer Security (TLS) fundamentals
- Basic knowledge of Linux security principles
- Familiarity with mechanisms for updating embedded firmware
Audience
- Security engineers responsible for ensuring the integrity and confidentiality of data for government systems
- Firmware developers working on secure embedded systems
- System administrators tasked with managing Baseboard Management Controller (BMC) infrastructure
Testimonials (4)
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
That the trainer adapts to our needs