4.2 KiB
Provisioner - Procure Hardware
The provisioner is responsible for:
-
Procuring equipment
-
Setting up the Facility
-
Maintaining stock of supplies in the Facility
-
Minimizing hardware supply chain security risks
Directives
- MUST maintain chain of custody for all hardware until after it's properly stored or where necessary tamper-proofed
The different procedures are ordered in chronological preference, to improve the efficiency of setting up the system.
Facility
-
Identify a location which is suitable for Level 2 ceremonies:
- SHOULD be lockable to prevent inflow and outflow of persons during ceremonies
-
Procure an enclosure for locking equipment. A simple lockbox or a safe can be used. It should be at least large enough to fit several laptops, with some extra room.
-
Designate the location as the facility for conducting ceremonies and update documentation and policies to reflect this
Preparing SD Cards
SD cards don't require special chain of custody, but ideally should be purchased from a reputable supplier.
SD Card Models
{{ #include ../../../../hardware-models.md:sd-models }}
Notes
-
The location should always be well stocked with freshly formatted SD cards
-
There should be at least 20 microSD and 20 SD cards available for use
-
Both microSD and regular SD cards should be available
-
They should be formatted to
ext4
format
-
-
Usage of these SD cards:
-
Transferring transaction data from online to air-gapped machine
-
Storing tamper proofing evidence produced at the end of the ceremony
-
Procedure: formatting SD Card to ext4
{{ #include ../../../../sd-formatting.md:steps }}
Tamper Proofing Equipment
Vacuum Sealer and roll
{{ #include ../../../../tamper-evidence-methods.md:vsbwf-equipment}}
Colored beads
{{ #include ../../../../tamper-evidence-methods.md:vsbwf-filler}}
Digital camera
{{ #include ../../../../tamper-evidence-methods.md:digital-cameras}}
Polaroid camera
{{ #include ../../../../tamper-evidence-methods.md:polaroid-cameras}}
AirgapOS (SD Card)
An SD card with AirgapOS written to it will be required to run ceremonies.
The AirgapOS SD Card once provisioned will be used in creating the tamper proofed airgap bundle
{{ #include ../../../../one-time-use-airgapos.md:steps }}
Shardfile (SD Card)
There should be multiple SD cards containing the shardfile data. Shardfile data is produced during a Root Entropy derivation ceremony.
The Shardfile SD Card once provisioned will be used in creating the tamper proofed airgap bundle
- Label: "Shardfile"
Trusted Keys (SD Card)
This procedure requires 2 individuals in order to witness the process and verify that the data being burned to the card is correct.
The Trusted Keys SD Card once provisioned will be used in creating the tamper proofed airgap bundle
Procedure
-
Get a freshly formatted SD card
-
Plug it into a computer
-
Navigate the the official Keychain repository of your organization
-
Select provisioner and approver keys from the Keychain repository
-
Download the desired keys along with detached signatures
-
Copy the
.asc
and signature files to the SD card -
Use the
sdtool
to lock the card
{{ #include ../../../../sdtool-instructions.md:steps }}
- Label the card "Trusted Keys "
Computer Procurement
For Level 2 security, air-gapped computers which are used for cryptographic material management and operations are required.
Sealable plastic bag is required for this procedure:
{{ #include ../../../../hardware-models.md:sealable-plastic-bags }}
Models
{{ #include ../../../../hardware-models.md:computer-models }}
Procedure
{{ #include ../../../../hardware-procurement-and-chain-of-custody.md:steps}}
Air-gapped bundle
-
Tamper proof together the following objects:
Procedure
{{ #include ../../../../tamper-evidence-methods.md:vsbwf-procedure-sealing }}