mirror of
https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
synced 2025-08-22 10:07:24 +00:00
Update README.md
Corrected names of anchor tags.
This commit is contained in:
parent
7401dd3a5a
commit
f145adc1ae
60
README.md
60
README.md
@ -2,36 +2,36 @@
|
||||
# Hardware and Firmware Security Guidance
|
||||
|
||||
## Table of Contents
|
||||
- 1\. [About this Repository](#about-this-repository)
|
||||
- 2\. [Recommended Actions](#recommended-actions)
|
||||
- 3\. [Device Configuration Guidance](#device-configuration-guidance)
|
||||
- 3\.1\. [Procurement and Acceptance Testing](#procurement-and-acceptance-testing)
|
||||
- 3\.2\. [Firmware Configuration and Hardening](#firmware-configuration-and-hardening)
|
||||
- 3\.3\. [UEFI Secure Boot](#uefi-secure-boot)
|
||||
- 3\.4\. [Zero Trust](#zero-trust)
|
||||
- 3\.5\. [Baseboard Management Controller](#baseboard-management-controller)
|
||||
- 4\. [Boot Vulnerabilities](#boot-vulnerabilities)
|
||||
- 4\.1\. [PKFail](#pkfail)
|
||||
- 4\.2\. [Shim Shady](#shim-shady)
|
||||
- 4\.3\. [BlackLotus)](#BlackLotus)
|
||||
- 4\.4\. [BootHole](#boothole)
|
||||
- 4\.5\. [BootKitty](#bootkitty)
|
||||
- 5\. [Firmware Vulnerabilities](#firmware-vulnerabilities)
|
||||
- 5\.1\. [LogoFail](#logofail)
|
||||
- 5\.2\. [Lojax](#lojax)
|
||||
- 6\. [Physical Attack Vulnerabilities](#physical-attack-vulnerabilities)
|
||||
- 6\.1\. [Bitlocker dTPM Probing](#bitlocker-dtpm-probing)
|
||||
- 7\. [Side Channel Vulnerabilities](#side-channel-vulnerabilities)
|
||||
- 7\.1\. [General Messaging](#general-messaging)
|
||||
- 7\.2\. [Historical Guidance](#historical-guidance)
|
||||
- 8\. [Device Integrity](#device-integrity)
|
||||
- 8\.1\. [TPM Use Cases](#tpm-use-cases)
|
||||
- 8\.2\. [Reference Integrity Manifest](reference-integrity-manifest)
|
||||
- 8\.3\. [Software Bill of Materials](#software-bill-of-materials)
|
||||
- 9\. [Hardware Upgrade Guidance](#hardware-upgrade-guidance)
|
||||
- 10\. [License](#license)
|
||||
- 11\. [Contributing](#contributing)
|
||||
- 12\. [Disclaimer](#disclaimer)
|
||||
- 1\. [About this Repository](#1-about-this-repository)
|
||||
- 2\. [Recommended Actions](#2-recommended-actions)
|
||||
- 3\. [Device Configuration Guidance](#3-device-configuration-guidance)
|
||||
- 3\.1\. [Procurement and Acceptance Testing](#31-procurement-and-acceptance-testing)
|
||||
- 3\.2\. [Firmware Configuration and Hardening](#32-firmware-configuration-and-hardening)
|
||||
- 3\.3\. [UEFI Secure Boot](#33-uefi-secure-boot)
|
||||
- 3\.4\. [Zero Trust](#34-zero-trust)
|
||||
- 3\.5\. [Baseboard Management Controller](#35-baseboard-management-controller)
|
||||
- 4\. [Boot Vulnerabilities](#4-boot-vulnerabilities)
|
||||
- 4\.1\. [PKFail](#41-pkfail)
|
||||
- 4\.2\. [Shim Shady](#41-shim-shady)
|
||||
- 4\.3\. [BlackLotus)](#43-BlackLotus)
|
||||
- 4\.4\. [BootHole](#44-boothole)
|
||||
- 4\.5\. [BootKitty](#45-bootkitty)
|
||||
- 5\. [Firmware Vulnerabilities](#5-firmware-vulnerabilities)
|
||||
- 5\.1\. [LogoFail](#51-logofail)
|
||||
- 5\.2\. [Lojax](#52-lojax)
|
||||
- 6\. [Physical Attack Vulnerabilities](#6-physical-attack-vulnerabilities)
|
||||
- 6\.1\. [Bitlocker dTPM Probing](#61-bitlocker-dtpm-probing)
|
||||
- 7\. [Side Channel Vulnerabilities](#7-side-channel-vulnerabilities)
|
||||
- 7\.1\. [General Messaging](#71-general-messaging)
|
||||
- 7\.2\. [Historical Guidance](#72-historical-guidance)
|
||||
- 8\. [Device Integrity](#8-device-integrity)
|
||||
- 8\.1\. [TPM Use Cases](#81-tpm-use-cases)
|
||||
- 8\.2\. [Reference Integrity Manifest](#82-reference-integrity-manifest)
|
||||
- 8\.3\. [Software Bill of Materials](#83-software-bill-of-materials)
|
||||
- 9\. [Hardware Upgrade Guidance](#9-hardware-upgrade-guidance)
|
||||
- 10\. [License](#10-license)
|
||||
- 11\. [Contributing](#11-contributing)
|
||||
- 12\. [Disclaimer](#12-disclaimer)
|
||||
|
||||
## 1. About this Repository
|
||||
This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware, firmware, and supply chain vulnerabilities. The repository functions as a companion to NSA Cybersecurity Advisories such as [Cybersecurity Advisories and Guidance](https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/). This repository is updated as new information, research, strategies, and guidance are developed.
|
||||
|
Loading…
x
Reference in New Issue
Block a user