include procurement steps in the provisioner document
This commit is contained in:
parent
46a088b1b5
commit
cc6f6d475b
|
@ -69,7 +69,7 @@ SD cards don't require special chain of custody, but ideally should be purchased
|
||||||
### Polaroid camera
|
### Polaroid camera
|
||||||
{{ #include ../../../../tamper-evidence-methods.md:polaroid-cameras}}
|
{{ #include ../../../../tamper-evidence-methods.md:polaroid-cameras}}
|
||||||
|
|
||||||
## AirgapOS
|
## AirgapOS (SD Card)
|
||||||
|
|
||||||
An SD card with AirgapOS written to it will be required to run ceremonies.
|
An SD card with AirgapOS written to it will be required to run ceremonies.
|
||||||
|
|
||||||
|
@ -77,7 +77,7 @@ The AirgapOS SD Card once provisioned will be used in creating the [tamper proof
|
||||||
|
|
||||||
{{ #include ../../../../one-time-use-airgapos.md:steps }}
|
{{ #include ../../../../one-time-use-airgapos.md:steps }}
|
||||||
|
|
||||||
### Shardfile
|
### Shardfile (SD Card)
|
||||||
|
|
||||||
There should be multiple SD cards containing the shardfile data. Shardfile data is produced during a [Root Entropy](todo) derivation ceremony.
|
There should be multiple SD cards containing the shardfile data. Shardfile data is produced during a [Root Entropy](todo) derivation ceremony.
|
||||||
|
|
||||||
|
@ -85,15 +85,14 @@ The Shardfile SD Card once provisioned will be used in creating the [tamper proo
|
||||||
|
|
||||||
* Label: "Shardfile"
|
* Label: "Shardfile"
|
||||||
|
|
||||||
|
## Trusted Keys (SD Card)
|
||||||
## Trusted Keys
|
|
||||||
|
|
||||||
### Procedure
|
|
||||||
|
|
||||||
This procedure requires 2 individuals in order to witness the process and verify that the data being burned to the card is correct.
|
This procedure requires 2 individuals in order to witness the process and verify that the data being burned to the card is correct.
|
||||||
|
|
||||||
The Trusted Keys SD Card once provisioned will be used in creating the [tamper proofed airgap bundle](#air-gapped-bundle)
|
The Trusted Keys SD Card once provisioned will be used in creating the [tamper proofed airgap bundle](#air-gapped-bundle)
|
||||||
|
|
||||||
|
### Procedure
|
||||||
|
|
||||||
1. Get a freshly formatted SD card
|
1. Get a freshly formatted SD card
|
||||||
|
|
||||||
1. Plug it into a computer
|
1. Plug it into a computer
|
||||||
|
@ -116,13 +115,17 @@ The Trusted Keys SD Card once provisioned will be used in creating the [tamper p
|
||||||
|
|
||||||
For [Level 2](../../../../threat-model.md#level-2) security, air-gapped computers which are used for cryptographic material management and operations are required.
|
For [Level 2](../../../../threat-model.md#level-2) security, air-gapped computers which are used for cryptographic material management and operations are required.
|
||||||
|
|
||||||
|
Sealable plastic bag is required for this procedure:
|
||||||
|
|
||||||
|
{{ #include ../../../../hardware-models.md:sealable-plastic-bags }}
|
||||||
|
|
||||||
### Models
|
### Models
|
||||||
|
|
||||||
{{ #include ../../../../hardware-models.md:computer-models }}
|
{{ #include ../../../../hardware-models.md:computer-models }}
|
||||||
|
|
||||||
### Procedure
|
### Procedure
|
||||||
|
|
||||||
1. Follow the [chain of custody procurement procedure](../../../../hardware-procurement-and-chain-of-custody.md)
|
{{ #include ../../../../hardware-procurement-and-chain-of-custody.md:steps}}
|
||||||
|
|
||||||
## Air-gapped bundle
|
## Air-gapped bundle
|
||||||
|
|
||||||
|
|
|
@ -38,11 +38,8 @@
|
||||||
|
|
||||||
## Tamper Proofing
|
## Tamper Proofing
|
||||||
|
|
||||||
* Sealable See-Through Bags
|
// ANCHOR: sealable-plastic-bags
|
||||||
|
[Alert Security bag](https://shop.alertsecurityproducts.com/clear-alert-bank-deposit-bag-15-x-20-250cs?affiliate=ppc12&gad_source=1&gclid=CjwKCAiAgoq7BhBxEiwAVcW0LJoCVUqYI1s4RGoctHxMwtmNlwenDhgP_0x4gjB9W2e4f_7tzdJ_rxoCOwMQAvD_BwE)
|
||||||
* [Alert Security bag](https://shop.alertsecurityproducts.com/clear-alert-bank-deposit-bag-15-x-20-250cs?affiliate=ppc12&gad_source=1&gclid=CjwKCAiAgoq7BhBxEiwAVcW0LJoCVUqYI1s4RGoctHxMwtmNlwenDhgP_0x4gjB9W2e4f_7tzdJ_rxoCOwMQAvD_BwE)
|
// ANCHOR_END: sealable-plastic-bags
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* ANCHOR_END: all */
|
/* ANCHOR_END: all */
|
|
@ -1,3 +1,4 @@
|
||||||
|
/* ANCHOR: all */
|
||||||
# Procurement & Chain of Custody
|
# Procurement & Chain of Custody
|
||||||
|
|
||||||
## Provisioning Chain of Custody
|
## Provisioning Chain of Custody
|
||||||
|
@ -9,7 +10,7 @@ All steps of the provisioning process need to be completed under the supervision
|
||||||
The following steps must all be completed under the continued supervision and with the involvement of all parties present. It is instrumental that there is not a single moment where the device is left unsupervised, or under the supervision of only 1 individual.
|
The following steps must all be completed under the continued supervision and with the involvement of all parties present. It is instrumental that there is not a single moment where the device is left unsupervised, or under the supervision of only 1 individual.
|
||||||
|
|
||||||
## Provisioning Hardware
|
## Provisioning Hardware
|
||||||
|
// ANCHOR: steps
|
||||||
1. Selecting a Purchase Location
|
1. Selecting a Purchase Location
|
||||||
|
|
||||||
* Select at least 4 stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that a threat actor is able to plant a compromised computer in a store ahead of time.
|
* Select at least 4 stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that a threat actor is able to plant a compromised computer in a store ahead of time.
|
||||||
|
@ -23,7 +24,5 @@ The following steps must all be completed under the continued supervision and wi
|
||||||
4. If the equipment does not have to be tamper proofed, simply deliver it to its storage location, and update the inventory repository with the serial number of the device.
|
4. If the equipment does not have to be tamper proofed, simply deliver it to its storage location, and update the inventory repository with the serial number of the device.
|
||||||
|
|
||||||
5. If the equipment does require tamper proofing, apply the appropriate level of tamper proofing for the security level you are performing the procurement for.
|
5. If the equipment does require tamper proofing, apply the appropriate level of tamper proofing for the security level you are performing the procurement for.
|
||||||
|
// ANCHOR_END:steps
|
||||||
## Tested Hardware (AirgapOS Compatibility)
|
/* ANCHOR_END: all */
|
||||||
|
|
||||||
{{ #include hardware-models.md:computer-models }}
|
|
Loading…
Reference in New Issue