Update README.md

Corrected names of anchor tags.
This commit is contained in:
43313EB9AA87E7039F8F3948282E61C0CB12372C5499884609A01B2BCA37B973 2024-12-06 12:51:25 -05:00 committed by GitHub
parent 7401dd3a5a
commit f145adc1ae
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -2,36 +2,36 @@
# Hardware and Firmware Security Guidance # Hardware and Firmware Security Guidance
## Table of Contents ## Table of Contents
- 1\. [About this Repository](#about-this-repository) - 1\. [About this Repository](#1-about-this-repository)
- 2\. [Recommended Actions](#recommended-actions) - 2\. [Recommended Actions](#2-recommended-actions)
- 3\. [Device Configuration Guidance](#device-configuration-guidance) - 3\. [Device Configuration Guidance](#3-device-configuration-guidance)
- 3\.1\. [Procurement and Acceptance Testing](#procurement-and-acceptance-testing) - 3\.1\. [Procurement and Acceptance Testing](#31-procurement-and-acceptance-testing)
- 3\.2\. [Firmware Configuration and Hardening](#firmware-configuration-and-hardening) - 3\.2\. [Firmware Configuration and Hardening](#32-firmware-configuration-and-hardening)
- 3\.3\. [UEFI Secure Boot](#uefi-secure-boot) - 3\.3\. [UEFI Secure Boot](#33-uefi-secure-boot)
- 3\.4\. [Zero Trust](#zero-trust) - 3\.4\. [Zero Trust](#34-zero-trust)
- 3\.5\. [Baseboard Management Controller](#baseboard-management-controller) - 3\.5\. [Baseboard Management Controller](#35-baseboard-management-controller)
- 4\. [Boot Vulnerabilities](#boot-vulnerabilities) - 4\. [Boot Vulnerabilities](#4-boot-vulnerabilities)
- 4\.1\. [PKFail](#pkfail) - 4\.1\. [PKFail](#41-pkfail)
- 4\.2\. [Shim Shady](#shim-shady) - 4\.2\. [Shim Shady](#41-shim-shady)
- 4\.3\. [BlackLotus)](#BlackLotus) - 4\.3\. [BlackLotus)](#43-BlackLotus)
- 4\.4\. [BootHole](#boothole) - 4\.4\. [BootHole](#44-boothole)
- 4\.5\. [BootKitty](#bootkitty) - 4\.5\. [BootKitty](#45-bootkitty)
- 5\. [Firmware Vulnerabilities](#firmware-vulnerabilities) - 5\. [Firmware Vulnerabilities](#5-firmware-vulnerabilities)
- 5\.1\. [LogoFail](#logofail) - 5\.1\. [LogoFail](#51-logofail)
- 5\.2\. [Lojax](#lojax) - 5\.2\. [Lojax](#52-lojax)
- 6\. [Physical Attack Vulnerabilities](#physical-attack-vulnerabilities) - 6\. [Physical Attack Vulnerabilities](#6-physical-attack-vulnerabilities)
- 6\.1\. [Bitlocker dTPM Probing](#bitlocker-dtpm-probing) - 6\.1\. [Bitlocker dTPM Probing](#61-bitlocker-dtpm-probing)
- 7\. [Side Channel Vulnerabilities](#side-channel-vulnerabilities) - 7\. [Side Channel Vulnerabilities](#7-side-channel-vulnerabilities)
- 7\.1\. [General Messaging](#general-messaging) - 7\.1\. [General Messaging](#71-general-messaging)
- 7\.2\. [Historical Guidance](#historical-guidance) - 7\.2\. [Historical Guidance](#72-historical-guidance)
- 8\. [Device Integrity](#device-integrity) - 8\. [Device Integrity](#8-device-integrity)
- 8\.1\. [TPM Use Cases](#tpm-use-cases) - 8\.1\. [TPM Use Cases](#81-tpm-use-cases)
- 8\.2\. [Reference Integrity Manifest](reference-integrity-manifest) - 8\.2\. [Reference Integrity Manifest](#82-reference-integrity-manifest)
- 8\.3\. [Software Bill of Materials](#software-bill-of-materials) - 8\.3\. [Software Bill of Materials](#83-software-bill-of-materials)
- 9\. [Hardware Upgrade Guidance](#hardware-upgrade-guidance) - 9\. [Hardware Upgrade Guidance](#9-hardware-upgrade-guidance)
- 10\. [License](#license) - 10\. [License](#10-license)
- 11\. [Contributing](#contributing) - 11\. [Contributing](#11-contributing)
- 12\. [Disclaimer](#disclaimer) - 12\. [Disclaimer](#12-disclaimer)
## 1. About this Repository ## 1. About this Repository
This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware, firmware, and supply chain vulnerabilities. The repository functions as a companion to NSA Cybersecurity Advisories such as [Cybersecurity Advisories and Guidance](https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/). This repository is updated as new information, research, strategies, and guidance are developed. This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware, firmware, and supply chain vulnerabilities. The repository functions as a companion to NSA Cybersecurity Advisories such as [Cybersecurity Advisories and Guidance](https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/). This repository is updated as new information, research, strategies, and guidance are developed.