Get in Touch

Course Outline

  • BMC Threat Model for government
  • Attack Surface of Server BMCs for government
  • Common Vulnerabilities in Legacy BMC Firmware for government
  • OpenBMC Security Architecture Overview for government
  • Compliance Requirements (NIST, PCI-DSS) for government

Secure Boot for government

  • U-Boot Verified Boot Chain for government
  • Image Signing with RSA and ECDSA for government
  • Key Hierarchy and Revocation for government
  • Measurement and Attestation Basics for government

Firmware Update Security for government

  • Image Signature Verification Flow for government
  • Rollback Protection and Version Policies for government
  • Dual-Bank Update Strategies for government
  • Code Update via Redfish and IPMI for government

Certificate Management for government

  • Phosphor-Certificate-Manager Architecture for government
  • Installing and Replacing HTTPS Certificates for government
  • Certificate Authority (CA) Trust Stores for government
  • LDAPS and Client Certificate Authentication for government

Authentication and Authorization for government

  • Local User Management and Password Policies for government
  • LDAP and Active Directory Integration for government
  • PAM Stack Configuration for government
  • Redfish RBAC and Privilege Mapping for government

Network Security for government

  • Firewall Rules and nftables for government
  • TLS 1.3 Configuration in bmcweb for government
  • SSH Hardening and Key-Based Authentication for government
  • Network Segmentation for BMC Interfaces for government

Audit and Response for government

  • Remote Syslog Configuration for government
  • Security Event Logging for government
  • SEL and Audit Trail Management for government
  • Incident Response for Compromised BMCs for government

Security Testing for government

  • Static Analysis with CodeQL and Bandit for government
  • Fuzzing D-Bus Interfaces for government
  • Penetration Testing REST and Redfish APIs for government
  • CVE Tracking and Patch Management for government

Requirements

  • Comprehensive understanding of Public Key Infrastructure (PKI) and Transport Layer Security (TLS) fundamentals
  • Basic knowledge of Linux security principles
  • Familiarity with mechanisms for updating embedded firmware

Audience

  • Security engineers responsible for ensuring the integrity and confidentiality of data for government systems
  • Firmware developers working on secure embedded systems
  • System administrators tasked with managing Baseboard Management Controller (BMC) infrastructure
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories