White Papers

New Security Features in the Integrated Dell Remote Access Controller 7
ii
Contents
Introduction .............................................................................................................. 3
iDRAC7 firmware signing ............................................................................................... 3
The threat landscape ................................................................................................. 3
Keeping pace ......................................................................................................... 3
The build process: signing the firmware .......................................................................... 4
Field update: verifying the firmware signature ................................................................ 4
Firmware downgrades ............................................................................................... 4
In the unlikely event of a compromised private key .......................................................... 4
Built-in unique Hidden Root Key ..................................................................................... 4
Hidden Root Key: keeping secrets confidential .................................................................. 5
Hidden Root Key: uniquely identifying a particular server ..................................................... 5
Summary: best features of the TPM ................................................................................ 5
Credential vault ......................................................................................................... 6
Protected storage ..................................................................................................... 6
Field Service Debug authorization facility.......................................................................... 6
Benefits .................................................................................................................. 6
Decommissioning and reprovisioning support ...................................................................... 7
Summary .................................................................................................................. 7
This document is for informational purposes only and may contain typographical errors and
technical inaccuracies. The content is provided as is, without express or implied warranties of any
kind.
© 2012 Dell Inc. All rights reserved. Dell and its affiliates cannot be responsible for errors or omissions
in typography or photography. Dell, the Dell logo and PowerEdge are trademarks of Dell Inc. Microsoft,
BitLocker, and Windows are either trademarks or registered trademarks of Microsoft Corporation in the
United States and/or other countries. Other trademarks and trade names may be used in this document
to refer to either the entities claiming the marks and names or their products. Dell disclaims
proprietary interest in the marks and names of others.
April 2012| Rev 1.0