Appendix A List of Acronyms

ACA

Attestation Certificate Authority

AD

Active Directory

ADK

(Windows) Assessment and Deployment Kit

API

Application Programming Interface

AQL

(IBM QRadar) Ariel Query Language

BIOS

Basic Input/Output System

CMSL

(HP) Client Management Script Library

DHCP

Dynamic Host Configuration Protocol

DNS

Domain Name System

DPD

Direct Platform Data

DTD

Dell Trusted Device

FQDN

Fully Qualified Domain Name

HIRS

Host Integrity at Runtime and Start-Up

HPE

Hewlett Packard Enterprise

HTTP

Hypertext Transfer Protocol

IIS

(Microsoft) Internet Information Services

IP

Internet Protocol

IRM

(Archer) Integrated Risk Management

IT

Information Technology

JDK

Java Development Kit

JSON

JavaScript Object Notation

NCCoE

National Cybersecurity Center of Excellence

NIST

National Institute of Standards and Technology

NTP

Network Time Protocol

ODM

Original Design Manufacturer

OEM

Original Equipment Manufacturer

OS

Operating System

PC

Personal Computer

PCVT

(HPE) Platform Certificate Verification Tool

PM2

Process Manager 2

PMCS

Platform Manifest Correlation System

PXE

Preboot Execution Environment

REST

Representational State Transfer

SAS

Serial Attached SCSI

SCA

Supply Chain Assurance

SCRM

Supply Chain Risk Management

SCSI

Small Computer System Interface

SCV

(Dell) Secured Component Verification

SKU

Stock Keeping Unit

SP

Special Publication

SSMS

(Microsoft) SQL Server Management Studio

TB

Terabyte

TCG

Trusted Computing Group

TEI

(NCCoE) Trusted Enterprise Infrastructure

TFTP

Trivial File Transfer Protocol

TPM

Trusted Platform Module

TSC

(Intel) Transparent Supply Chain

UEFI

Unified Extensible Firmware Interface

UI

User Interface

URL

Uniform Resource Locator

UUID

Universally Unique Identifier

WinPE

Windows Preinstallation Environment

XML

Extensible Markup Language

Appendix B Archer Applications

The following tables detail the data fields in each Archer application for use in Section 2.11.2.1. The first column is the name of the data field we used in this demonstration and the second column is the data type. Data fields that are calculated are indexed in the third column and available in the subsequent table. Bolded rows are Key Fields, similar to a primary key.

Table 3‑1 Devices Application

Data Field Name

Data Field Type

Calculated

Associated Components

Cross-Reference

Last Event Timestamp

Date

Last System Scan Date

Date

System Firmware Date

Date

Firmware Integrity Aggregation Status

Numeric

Firmware Integrity Check Status

Numeric

Count of Failed Configuration Scan Results

Text

Count of Configuration Scans

Text

Enterprise Unique Identifier

Text

Family

Text

Platform Model

Text

Model

Text

Original Design Manufacturer

Text

Original Equipment Manufacturer

Text

Product Name

Text

SKU

Text

System Firmware Version

Text

Manufacturer

Values List

Device Scan State

Values List

1

Eclypsium Integrity Scan Status

Values List

2

Continuous Monitoring Platform Integrity Status

Values List

3

Table 3‑2 Calculated Fields (Devices)

Index

Calculation

1

IF (ISEMPTY([Helper Previous Last Scanned Date Calc]),
VALUEOF([Device Scan State],"New"),
IF (DATEDIF([Helper Max Last Scanned Date Calc],[Helper
Previous Last Scanned Date Calc])=0, [Device Scan State],
VALUEOF([Device Scan State], "Matched")))

2

IF (ISEMPTY([Firmware Integrity Check Status]),
VALUEOF([Eclypsium Integrity Scan Status], "No Data"),
IF ([Firmware Integrity Check Status]=1, VALUEOF([Eclypsium
Integrity Scan Status], "No Integrity Issues Detected"),
IF ([Firmware Integrity Check Status]=0, VALUEOF([Eclypsium
Integrity Scan Status], "Integrity Issue Detected - Action
Recommended"))))

3

IF (ISEMPTY([Continuous Monitoring Platform Integrity Status]),
VALUEOF([Continuous Monitoring Platform Integrity Status], "No
Data from Configuration Management System"))

Table 3‑3 Components Application

Data Field Name

Data Field Type

Addresses

Text

Class

Text

Field Replaceable

Text

First Published

First Published Date

Free Text

Text

Last Updated

Last Updated Date

Manufacturer

Text

Model

Text

Platform Certificate

Text

Platform Certificate URI

Text

Revision

Text

SCA Devices (Associated Components)

Related Records

Seagate Firmware Attestation (Seagate Drive Serial)

Related Records

Seagate Firmware Hash (Seagate Drive)

Related Records

Serial

Text

Tracking ID

Tracking ID

Version

Text

Associated Components

Cross-Reference

Table 3‑4 HP UEFI Configuration Variables Application

Data Field Name

Data Field Type

Calculated

Associated Computing Device

Cross-Reference

CompositeUUIDVariable

Text

1

Computing Device UUID

Text

First Published

First Published Date

HP Inc BIOS Configuration Status

Values List

Last Updated

Last Updated Date

Tracking ID

Tracking ID

UEFI Variable Description

Text

2

UEFI Variable Friendly Name

Text

UEFI Variable Name

Text

UEFI Variable Possible Values

Text

3

UEFI Variable Recommended Values

Text

4

Value

Text

Table 3‑5 Calculated Fields (HP UEFI Configuration Variables)

Index

Calculation

1

CONCATENATE([Computing Device UUID],[UEFI Variable Name])

2

IF ([First Published]<>[Last Updated], "Change Detected",
IF ([First Published]=[Last Updated], "No Change Detected"))

3

IF ([UEFI Variable Name]="SS_SB_KeyProt", "Provides enhanced
protection of the secure boot databases and keys used by BIOS
to verify the integrity and authenticity of the OS bootloader
before launching it at boot.",
IF ([UEFI Variable Name]="FW_RIPD", "Utilizes specialized
hardware in the platform chipset to prevent, detect, and
remediate anomalies in the Runtime HP SMM BIOS.",
IF ([UEFI Variable Name]="TL_Power_Off", "HP Tamperlock
feature: The system immediately turns off if the cover is
removed while the system is On or in Sleep state S3 or Modern
Standby.",
IF ([UEFI Variable Name]="TL_Clear_TPM", "TPM is cleared on the
next startup after the cover is removed. Be aware that all
customer keys in the TPM are cleared. This setting should only
be Enabled in a situation where manual recovery is possible
using remote backups, or no recovery is desired. In the case of
BitLocker being enabled, the BitLocker recovery key is required
to decrypt the drive.",
IF ([UEFI Variable Name]="SS_GPT_HDD", "HP Sure Start maintains
a protected backup copy of the MBR/GPT partition table from the
primary drive and compares the backup copy to the primary on
each boot. If a difference is detected, the user is prompted
and can choose to recover from the backup to the original
state, or to update the protected backup copy with the
changes.",
IF ([UEFI Variable Name]="SS_GPT_Policy", "Defines Sure Start
behavior to either Local User Control or Automatic to restore
the MBR/GPT to the saved state any time differences are
encountered.",
IF ([UEFI Variable Name]="DMA_Protection", "BIOS will configure
IOMMU hardware for use by operating systems that support DMA
protection.",
IF ([UEFI Variable Name]="PreBoot_DMA", "IOMMU hardware-based
DMA protection is enabled in a BIOS pre-boot environment for
Thunderbolt and / or all internal and external PCI-e attached
devices.",
IF ([UEFI Variable Name]="Cover_Sensor", "Policy defined
actions taken when Tamperlock cover removal sensor is
triggered. Administrator credential or password requires valid
response before continuing to startup after the cover is
opened.",
IF ([UEFI Variable Name]="", "No Description", "No
Description")
)))))))))

4

IF ([UEFI Variable Name]="SS_SB_KeyProt", "[Disable, Enable]",
IF ([UEFI Variable Name]="FW_RIPD", "[Disable, Enable]",
IF ([UEFI Variable Name]="TL_Power_Off", "[Disable, Enable]",
IF ([UEFI Variable Name]="TL_Clear_TPM", "[Disable, Enable]",
IF ([UEFI Variable Name]="SS_GPT_HDD", "[Disable, Enable]",
IF ([UEFI Variable Name]="SS_GPT_Policy", "[Local user control,
Recover in event of corruption]",
IF ([UEFI Variable Name]="DMA_Protection", "[Disabled,
Enabled]",
IF ([UEFI Variable Name]="PreBoot_DMA", "[Thunderbolt Only, All
PCI-e Devices]",
IF ([UEFI Variable Name]="Cover_Sensor", "[Disable, Notify
user, Administrator Credential, Administrator Password]",
IF ([UEFI Variable Name]="", "No Possible Values", "No Possible
Values")
)))))))))

Table 3‑6 Seagate Firmware Attestation Application

Data Field Name

Data Field Type

Assessor Identifier

Text

Associated Computing Device

Cross-Reference

Device Nonce

Text

Firmware Version

Text

First Published

First Published Date

Last Updated

Last Updated Date

Root of Trust Identifier

Text

Root of Trust Nonce

Text

Seagate Drive Serial

Cross-Reference

Secure Boot Device State

Text

Signing Auth Database

Text

Tracking ID

Tracking ID

Table 3‑7 Seagate Firmware Hash Application

Data Field Name

Data Field Type

Calculated

Associated Computing Device

Cross-Reference

BFW IDBA Hash

Text

BFW ITCM Hash

Text

CFW Hash

Text

Drive Serial Number

Text

Firmware Hash Status

Values List

1

First Published

First Published Date

History

History Log

Last Updated

Last Updated Date

Seagate Drive

Cross-Reference

SEE Firmware Hash

Text

SEE Signing AuthN Key Certificate Hash

Text

SERVO Firmware Hash

Text

Signing AuthN Key Certificate Hash

Text

Tracking ID

Tracking ID

Table 3‑8 Calculated Fields (Seagate Firmware Hash)

Index

Calculation

1

IF ([First Published]<>[Last Updated], "Change Detected",
IF ([First Published]=[Last Updated], "No Change Detected"))