Technical white paper UEFI Secure Boot on HP business notebooks, desktops, and workstations
Secure Boot overview
Secure Boot is a feature to ensure that only authenticated code can start on a platform. The firmware is responsible for preventing launch of an untrusted OS by verifying the publisher of the OS loader based on policy, and is designed to mitigate root kit attacks.
Figure 4. UEFI Secure Boot flow.Native | Verified OS |
| |
loader | OS start | ||
UEFI | |||
(e.g. Win8) |
| ||
|
|
|
|
| Anti | 3rd party | |
UEFI | Windows 8 | Kernel | malware | ||
OS loader | installation | software | drivers | ||
| |||||
|
|
| start |
|
•All bootable data requires authentication before the BIOS hands off control to that entity.
•The UEFI BIOS checks the signature of the OS loader before loading. If the signature is not valid, the UEFI BIOS will stop the platform boot.
Firmware policies
Firmware support of Windows 8 differs between notebooks and desktops/workstations. The following sections describe the differences in policy settings configurable by the user.
Firmware policies for notebooks
There are two firmware policies critical for the support of Windows 8 on notebooks; Secure Boot and Boot Mode.
The Secure Boot policy has the following options:•Disable•EnableWhen Secure Boot is set to “Enable” BIOS will verify the boot loader signature before loading the OS.
The Boot Mode policy (for notebooks only) has the following options:•Legacy•UEFI Hybrid with compatibility support module (CSM)•UEFI Native without CSMWhen Boot Mode is set to “Legacy” or the UEFI Hybrid Support setting is “Enable,” the CSM is loaded and Secure Boot is automatically disabled.
After a complete BIOS•Boot Mode = Legacy (Other modes will be set by Preinstall at the factory according to the OS to be preinstalled.)
8