Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document the preference of using HSMs than other forms of securing private keys #448

Open
wants to merge 4 commits into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 11 additions & 1 deletion docs/submitting.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,9 +109,19 @@ There are strong recommendations on the types of certificates that
should be used in shim, and also on how keys should be managed for
security. See the 12th bullet in [Microsoft UEFI Signing
Requirements](https://techcommunity.microsoft.com/t5/hardware-dev-center/updated-uefi-signing-requirements/ba-p/1062916)
for tips on this, and also some sugested schems for key and certificate
for tips on this, and also some suggested schemes for key and certificate
management.

The recommendation of using HSMs is worth mentioning here in particular. To
ensure reasonable security, the keys should be generated directly in your HSM
and the private part should never leave it. All the signing shall be done by
delegating the cryptographic operations to your HSM in order to prevent a
malicious actor from copying the private part.
When asked about the security strategy used for the protection of your keys,
and you indeed do use an HSM, tell us the story of setting up your signing
infrastructure - showcase us, with utter pride, how prioritized the signing
security is in your organization!

### 3.3 Reproducible build

Reviewers will need to validate that they can reproduce your shim
Expand Down