Deploying Secure Boot: Key Creation and Management
Hardware Security Modules
• Microsoft strongly recommends using a Hardware Security Module
(HSM) for key creation
• Most HSMs have Federal Information Processing Standard (FIPS)
Publication 140-2 level 3 compliance
– Requires that keys are not exported or imported from the HSM.
• HSMs support multiple key storage options
– Local on the HSM itself
– On the server attached to the HSM - for solutions which requires lots
of keys
• The cryptographic module security policy shall specify a physical
security policy, including:
– Tamper-evident seals, locks, tamper response and zeroization
switches, and alarms
– Policy includes actions required by the operator(s) to ensure that
physical security is maintained such as periodic inspections
10 UEFI Summer Summit – July 2012 www.uefi.org