Pre-boot authentication
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Pre-Boot Authentication (PBA) or Power-On Authentication (POA)[1] serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the operating system until the user has confirmed they have the correct password or other credentials.[2]
Benefits of Pre-Boot Authentication
- Full disk encryption outside of the operating system level [2]
- Encryption of temporary files
- Data at rest protection
How Pre-Boot Authentication Works
Generic Boot Sequence
- Basic Input/Output System (BIOS)
- Master boot record (MBR) partition table
- Pre-boot authentication (PBA)
- Operating system (OS) boots
A PBA environment serves as an extension of the BIOS or boot firmware[citation needed] and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents[citation needed] Windows or any other operating system from loading until the user has confirmed he/she has the correct password to unlock the computer. That trusted layer eliminates the possibility[citation needed] that one of the millions of lines of OS code can compromise the privacy of personal or company data[citation needed].
Pre-Boot Authentication Technologies
Combinations with Full Disk Encryption
Pre-Boot Authentication is generally provided[citation needed] by a variety of full disk encryption vendors, but can be installed separately[citation needed]. Legacy FDE systems tended to rely upon PBA as their primary control. These systems have been replaced with hardware based dual factor systems like TPM chips. However, without some form of authentication, encryption provides little protection[citation needed]. Generally this authentication comes from Active Directory authentication at the GINA step of Windows.
PBA is easily defeated with Evil Maid style of attacks. However, with modern hardware (including TPM) most FDE solutions are able to ensure removal of hardware for brute force attacks are no longer possible.
PBA does require a high cost in performance and complete loss of manageability.
Authentication Methods
The standard complement of authentication methods exist for Pre-Boot Authentication including:
- Something you know (i.e. username / password)
- Something you have (i.e. smart card or other token)
- Something )
References
- ^ "Sophos brings enterprise-level encryption to the Mac". Network World. August 2, 2010. Retrieved 2010-08-03.
- ^ a b "Pre-Boot Authentication". SECUDE. February 21, 2008. Archived from the original on 2012-03-04. Retrieved 2008-02-22.