Dell releases Whitelist Security and Firmware Security Best Practices for Dell iDRAC.



Let’s read the Advanced Security engineer, Chip Webb regarding the approach:
‘’Anti-virus software has traditionally used a blacklist approach. This means that the anti-virus (AV) software examines programs before they are run for “signatures” – bits of code – that are known to be
associated with malware. If a program contains a signature indicating malware the AV package does not allow the program to run. In other words, any software that is determined to be in the signature list is not allowed to run. All other software is allowed to run. The signature list is the blacklist.
More recently some anti-virus software packages take the converse approach, called whitelisting. A whitelist AV package examines each program before it runs and if the program is determined to be in a list of known good programs it is allowed to run. All other programs are not allowed to run.
These two approaches require different management approaches. Blacklist AV packages require that their signature list be updated periodically to recognize newly developed malware. Whitelist AV packages require that a list of software packages that are allowed be created. In addition to lists, many whitelist programs support rules. A common rule is to allow software packages that are digitally signed by particular software publishers. If a software package complies with the rule set or it is in the list of known good packages it is allowed to execute.
iDRAC prevents foreign software from running in a whitelist manner. iDRAC firmware is packaged as a single binary “blob”. Only software in that blob is allowed to run. The whitelist is simply the single rule: only software in the blob can run.
An attacker might attempt to circumvent this rule by creating a “rogue firmware” that looks genuine Dell published firmware, but in fact contains malicious code.
Several best practices will prevent the introduction of rogue firmware on the iDRAC:
  • Only obtain iDRAC firmware from Dell
  • Store the firmware in a place with restricted access
  • Only allow a firmware update to be initiated by an authorized user
  • Require that the authorized user only use a firmware package that was stored in the place with restricted access
Note the following exceptions:
  • a malicious administrator could execute flash a rogue firmware
  • an administrator could be the victim of social engineering and be fooled into updating with non-authentic firmware
  • an administrator could have his credentials compromised
Of course all three of these exceptions are not unique to iDRAC and underscore the importance of the human factor in maintaining good security.
To account for these exceptions and further enhance security, iDRAC7 (present in Dell PowerEdge 12th Generation servers) improves upon previous iDRAC versions by requiring that the firmware image also be digitally signed, robustly ensuring that even in the face of the three exceptions noted above, iDRAC7 will reject unauthorized firmware.’’
To learn more about the Dell Remote Access Controller, you can visit: www.delltechcenter.com/iDRAC

Popular Posts