include procurement steps in the provisioner document

This commit is contained in:
Anton Livaja 2024-12-19 16:34:29 -05:00
parent 46a088b1b5
commit cc6f6d475b
Signed by: anton
GPG Key ID: 44A86CFF1FDF0E85
3 changed files with 17 additions and 18 deletions

View File

@ -69,7 +69,7 @@ SD cards don't require special chain of custody, but ideally should be purchased
### Polaroid camera ### Polaroid camera
{{ #include ../../../../tamper-evidence-methods.md:polaroid-cameras}} {{ #include ../../../../tamper-evidence-methods.md:polaroid-cameras}}
## AirgapOS ## AirgapOS (SD Card)
An SD card with AirgapOS written to it will be required to run ceremonies. An SD card with AirgapOS written to it will be required to run ceremonies.
@ -77,7 +77,7 @@ The AirgapOS SD Card once provisioned will be used in creating the [tamper proof
{{ #include ../../../../one-time-use-airgapos.md:steps }} {{ #include ../../../../one-time-use-airgapos.md:steps }}
### Shardfile ### Shardfile (SD Card)
There should be multiple SD cards containing the shardfile data. Shardfile data is produced during a [Root Entropy](todo) derivation ceremony. There should be multiple SD cards containing the shardfile data. Shardfile data is produced during a [Root Entropy](todo) derivation ceremony.
@ -85,15 +85,14 @@ The Shardfile SD Card once provisioned will be used in creating the [tamper proo
* Label: "Shardfile" * Label: "Shardfile"
## Trusted Keys (SD Card)
## Trusted Keys
### Procedure
This procedure requires 2 individuals in order to witness the process and verify that the data being burned to the card is correct. This procedure requires 2 individuals in order to witness the process and verify that the data being burned to the card is correct.
The Trusted Keys SD Card once provisioned will be used in creating the [tamper proofed airgap bundle](#air-gapped-bundle) The Trusted Keys SD Card once provisioned will be used in creating the [tamper proofed airgap bundle](#air-gapped-bundle)
### Procedure
1. Get a freshly formatted SD card 1. Get a freshly formatted SD card
1. Plug it into a computer 1. Plug it into a computer
@ -116,13 +115,17 @@ The Trusted Keys SD Card once provisioned will be used in creating the [tamper p
For [Level 2](../../../../threat-model.md#level-2) security, air-gapped computers which are used for cryptographic material management and operations are required. For [Level 2](../../../../threat-model.md#level-2) security, air-gapped computers which are used for cryptographic material management and operations are required.
Sealable plastic bag is required for this procedure:
{{ #include ../../../../hardware-models.md:sealable-plastic-bags }}
### Models ### Models
{{ #include ../../../../hardware-models.md:computer-models }} {{ #include ../../../../hardware-models.md:computer-models }}
### Procedure ### Procedure
1. Follow the [chain of custody procurement procedure](../../../../hardware-procurement-and-chain-of-custody.md) {{ #include ../../../../hardware-procurement-and-chain-of-custody.md:steps}}
## Air-gapped bundle ## Air-gapped bundle

View File

@ -38,11 +38,8 @@
## Tamper Proofing ## Tamper Proofing
* Sealable See-Through Bags // ANCHOR: sealable-plastic-bags
[Alert Security bag](https://shop.alertsecurityproducts.com/clear-alert-bank-deposit-bag-15-x-20-250cs?affiliate=ppc12&gad_source=1&gclid=CjwKCAiAgoq7BhBxEiwAVcW0LJoCVUqYI1s4RGoctHxMwtmNlwenDhgP_0x4gjB9W2e4f_7tzdJ_rxoCOwMQAvD_BwE)
* [Alert Security bag](https://shop.alertsecurityproducts.com/clear-alert-bank-deposit-bag-15-x-20-250cs?affiliate=ppc12&gad_source=1&gclid=CjwKCAiAgoq7BhBxEiwAVcW0LJoCVUqYI1s4RGoctHxMwtmNlwenDhgP_0x4gjB9W2e4f_7tzdJ_rxoCOwMQAvD_BwE) // ANCHOR_END: sealable-plastic-bags
/* ANCHOR_END: all */ /* ANCHOR_END: all */

View File

@ -1,3 +1,4 @@
/* ANCHOR: all */
# Procurement & Chain of Custody # Procurement & Chain of Custody
## Provisioning Chain of Custody ## Provisioning Chain of Custody
@ -9,7 +10,7 @@ All steps of the provisioning process need to be completed under the supervision
The following steps must all be completed under the continued supervision and with the involvement of all parties present. It is instrumental that there is not a single moment where the device is left unsupervised, or under the supervision of only 1 individual. The following steps must all be completed under the continued supervision and with the involvement of all parties present. It is instrumental that there is not a single moment where the device is left unsupervised, or under the supervision of only 1 individual.
## Provisioning Hardware ## Provisioning Hardware
// ANCHOR: steps
1. Selecting a Purchase Location 1. Selecting a Purchase Location
* Select at least 4 stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that a threat actor is able to plant a compromised computer in a store ahead of time. * Select at least 4 stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that a threat actor is able to plant a compromised computer in a store ahead of time.
@ -23,7 +24,5 @@ The following steps must all be completed under the continued supervision and wi
4. If the equipment does not have to be tamper proofed, simply deliver it to its storage location, and update the inventory repository with the serial number of the device. 4. If the equipment does not have to be tamper proofed, simply deliver it to its storage location, and update the inventory repository with the serial number of the device.
5. If the equipment does require tamper proofing, apply the appropriate level of tamper proofing for the security level you are performing the procurement for. 5. If the equipment does require tamper proofing, apply the appropriate level of tamper proofing for the security level you are performing the procurement for.
// ANCHOR_END:steps
## Tested Hardware (AirgapOS Compatibility) /* ANCHOR_END: all */
{{ #include hardware-models.md:computer-models }}