INFORMATION TECHNOLOGY STACK SECURITY CONTROL CONFIGURATION

    公开(公告)号:US20210336992A1

    公开(公告)日:2021-10-28

    申请号:US16860262

    申请日:2020-04-28

    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.

    SECURING MEMORY USING PROTECTED MEMORY REGIONS

    公开(公告)号:US20210034547A1

    公开(公告)日:2021-02-04

    申请号:US16528559

    申请日:2019-07-31

    Abstract: In exemplary aspects described herein, system memory is secured using protected memory regions. Portions of a system memory are assigned to endpoint devices, such as peripheral component interconnect express (PCIe) compliant devices. The portions of the system memory can include protected memory regions. The protected memory regions of the system memory assigned to each of the endpoint devices are configured to control access thereto using device identifiers and/or process identifiers, such as a process address space ID (PASID). When a transaction request is received by a device, the memory included in that request is used to determine whether it corresponds to a protected memory region. If so, the transaction request is executed if the identifiers in the request match the identifiers for which access is allowed to that protected memory region.

    Firmware verification through data ports

    公开(公告)号:US10303883B2

    公开(公告)日:2019-05-28

    申请号:US15333779

    申请日:2016-10-25

    Abstract: In some examples, a computing device includes a data port, device memory to store firmware for the computing device, and verification circuitry. The verification circuitry may override operation of the data port responsive to a determination that firmware verification mode criteria are satisfied. The verification circuitry may also extract firmware data from the device memory for verification of the firmware and provide the firmware data to an external device connected to the computing device through the data port.

Patent Agency Ranking