Skip to content

Instantly share code, notes, and snippets.

@lrvick
Created September 2, 2022 19:58
Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save lrvick/3b65e5a8b60108190ef6e5b1a383f510 to your computer and use it in GitHub Desktop.
Save lrvick/3b65e5a8b60108190ef6e5b1a383f510 to your computer and use it in GitHub Desktop.
Security upgrades most organizations need.

Web Content Signing via Service Workers

Web Request Signing via WebAuthn

  • Implementation:
    • Collect WebAuthn public keys for one or more devices for all users
    • External Authenticators: Yubikey, Nitrokey, Ledger, Trezor, Solokey, etc.
    • Platform Authenticators: iOS 13+, Android 7+, Windows Hello, many Chromebooks
    • Certify Webauthn public keys with trusted enclave
    • Webauthn sign all impacting web requests like trades and transfers
    • Private key enclaves validate request signatures before signing trades and transfers
  • Protections:
    • Compromised insider tampering with backends
    • TLS MITM
  • Resources:

Internal Supply chain integrity

External Supply chain integrity

Accountable Airgapped Workflows

  • Implementation
    • Multiple parties compile deterministic airgap OS and firmware
    • Multiple parties sign airgap os/firmware artifacts
    • New laptop acquired by multiple parties
    • Trusted firmware loaded, verifying signed hash with existing firmware
    • CA key pinned into firmware, and external TPM verification device
    • Laptop stored in highly tamper evident vault requiring multiple parties for access
    • Laptop firmware verifies multi-party signature on flash-drive iso and any scripts
    • Participants verify date and ensure it is the latest and expected version
  • Protections
  • Tampering by any single compromised insider
  • Tampering by any single compiler or build system
  • Resources:
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment