Professional Documents
Culture Documents
Information Technology
Cybersecurity
VT
Host OS
VT Linux VM VT
VM
Workload isolation, enabled by the Intel® vPro platform, reduces the attack surface
and the ability for malware to persist and spread across resources.
White Paper | Use Intel Virtualization Technologies to Help Protect Endpoint Applications & Data without Impacting the User Experience
Intel® VT-Redirect Protection (Intel® VT-rp) – Help Advanced Programmable Interrupt Controller
Protect Against Kernel Memory Corruption and Page Virtualization
Table Attacks To virtualize interrupt delivery to virtual processors, the
Malicious attacks on the OS kernel and the page tables hypervisor uses a synthetic interrupt controller (SynIC)—an
threaten applications and data across the platform and extension of a virtualized local Advanced Programmable
beyond. Intel VT-rp delivers hardware acceleration for an Interrupt Controller (APIC)—a circuit that handles the priority
otherwise performance-intensive attack mitigation. of interrupts in a computer. Each virtual processor has a local
APIC instance with the SynIC extensions. These extensions
Through enhancements to the paging architecture, Intel VT- provide a simple inter-partition communication mechanism.
rp accelerates the use of trusted page tables. These trusted Interrupts delivered are either external and internal. External
page tables are created by a hypervisor or virtual machine interrupts originate from other partitions or devices, and
monitor (VMM) to enforce guest linear to physical page internal interrupts originate from within the partition itself.
translations.
Interrupt delivery requires the exit and reentry of VMs—
Intel VT-rp comprises three related components: a Hypervisor- typically time-consuming and a major source of overhead. To
managed Linear Address Translation (HLAT) mechanism, a minimize that, the Intel vPro platform emulates those activities
new Extended Page Table (EPT) control bit called “paging- in hardware using a feature called Advanced Programmable
write”, and another new EPT control bit called “verify guest Interrupt Controller Virtualization (APICv). APICv eliminates
paging.” Intel VT-rp enables the VMM to ensure the integrity the VM exits triggered by privileged register access during
of guest linear to physical translations, greatly limiting an entire the handling of virtual interrupts. APIC register virtualization
class of attacks commonly found in rootkits. Intel VT-rp is and virtual interrupt handling eliminate a major source of
available on 12th gen Intel vPro platforms, but has not been virtualization overhead.
enabled in any mainstream OS yet. Intel will make an
announcement when Intel TV-rp is enabled.
Windows Supports Intel Virtual Technology
Kernel DMA Protection Based Security on the Intel vPro Platform
DMA-capable devices can read and write to system memory Intel vPro platform business clients exceed the secure-core
without having to engage the system processor. Once, these PC specification by delivering hardware-based capabilities
devices existed only inside the PC, but today, hot plug PCIe enabling greater Windows security capacity.
ports such as Thunderbolt™ technology give modern PCs
greater extensibility. Secure Biometric Authentication
To help protect data flowing to and from such devices, Intel Biometric authentication is becoming a mainstream use case
VT-d provides the foundation for solutions such as Kernel driven by Windows Hello. Securing the entire biometric
DMA Protection on Microsoft Windows 10 (1803 and above). datapath is important to enable mainstream adoption of
In addition, Intel VT-d based security has been supported on biometrics which both enhances security (by elimination of
Mac OS since version 10.8.2 and on Linux since Kernel version passwords) and ease of use. Enabling this capability with
4.21. All these solutions block peripheral devices from Virtualized Trusted I/O (VTIO) helps Intel deliver greater value
unauthorized access to system memory. for eCommerce use cases.
Mode-Based Execution Control (MBEC) Microsoft Windows in conjunction with Windows Hello support
VTIO with a Hyper-V based secure VM infrastructure. VTIO
MBEC virtualization provides an extra layer of protection from
works in conjunction with the hypervisor and trusted I/O
malware attacks in a virtualized environment. It enables
drivers running in a secure VM (which isolates and protects
hypervisors to more reliably and efficiently verify and enforce
I/O data via VT Extended Page Table-based memory views).
the integrity of kernel-level code.
VTIO protects I/O for USB/MIPI cameras used for biometric
MBEC provides finer-grain control on execute permissions to face authentication—the camera data can be securely
help protect the integrity of system code from malicious delivered to a biometric match engine running in the secure
changes. It provides additional refinement within the Extended VM (which also protects the biometric match template).
Page Tables by turning the Execute Enable (X) permission bit Starting with version 20H1, Microsoft Windows leverages the
into two options: XU for user pages, and XS for supervisor hypervisor-based architecture (called “VSM”) to support
pages. The CPU selects one or the other based on permission biometric authentication.
of the guest page and maintains an invariant for every page
VTIO leverages Intel VT-x and Intel VT-d for virtualization
that does not allow it to be both writable and supervisor-
acceleration, and USB dual channel Bus Device Function
executable at the same time. This feature enables hypervisor
(BDF) / MIPI Dual Command Channel—for concurrent use of
code integrity to share the page table between kernel and user
secure and non-secure cameras for USB and MIPI cameras,
mode without causing VMExits, which cause a large
respectively.
performance impact when processing unsigned user mode
code. The value of the XU/XS bits is delivered through the Secure Biometric Authentication
hypervisor, so hypervisor support is necessary.
On Intel vPro platform PCs, Windows Virtualization-based
security (VBS) isolates a secure region of memory from the
OS and increases protection from OS vulnerabilities. VBS
uses many hardware-based capabilities. The hypervisor uses
3
White Paper | Use Intel Virtualization Technologies to Help Protect Endpoint Applications & Data without Impacting the User Experience
Intel VT-x, VT-x2 with Extended Page Tables (EPT) and many TME for page-granular memory encryption through support
features used for performance optimization and security. For for multiple encryption keys. The hardware-generated
example, VBS uses Intel VT-d to accelerate advanced security ephemeral key of TME, which is inaccessible by software or
capabilities and improve reliability and security through device external interfaces, is still used to encrypt memory not
isolation using hardware-assisted remapping. Intel VT-d also specifically encrypted by software. Alternatively, Intel TME-
improves I/O per formance and availability by direct MK also supports software-provided keys.
assignment of devices. These features work in concert to
Intel TME-MK can effectively work with non-volatile memory
enable virtualized workloads that prevent malicious code
and key provisioning services. It is also attestable, so that
injection in the OS and protect data such as log-in credentials
enterprises can inventory and enforce protection on their fleet.
from direct memory access attacks and other modern threats.
For virtualized workloads, a hypervisor can manage the keys
Windows Virtual Secure Mode (VSM) uses Intel VT-x to to transparently provide memory encryption support for
protect key data and credentials (tokens) on the system’s main legacy OSs without modifications. Intel TME-MK is available
storage drive. VSM and Intel VT-x help prevent hackers from starting on 12th gen Intel vPro platforms after the Windows 11
obtaining credentials and infiltrating the enterprise version 22H2 update. Check out the Intel TME-MK data sheet
infrastructure. on Intel.com to learn more.
Beyond VSM, Windows Defender Credential Guard can isolate Intel Advanced Encryption Standard New Instructions
secrets so that only privileged system software can access
Intel AES-NI improves on the Advanced Encryption Standard
them, preventing credential theft attacks. Credential Guard
(AES) algorithm and accelerates the encryption of data in the
utilizes Intel VT-x to help protect credentials against OS kernel-
modern Intel processors for business clients and servers.
level malware in Virtual Secure Mode enclaves. Credential
Guard can be enabled via Microsoft Intune, Group Policy, Comprised of seven new instructions, Intel AES-NI makes
editing the Windows Registry, or using the Device Guard and pervasive encryption feasible in areas where previously it was
Credential Guard hardware readiness tool. not—that gives IT environments faster, more affordable data
protection, and greater security.
In addition, Windows includes a set of Intel VT-x enabled
hardware and OS hardening technologies called Windows Intel Key Locker for ChromeOS and Linux to Help
Defender Device Guard. A Device Guard feature called Prevent Attackers from Using System Cryptographic
Configurable Code Integrity restricts devices to run only
Keys
authorized applications. Simultaneously, a Device Guard
feature called Hypervisor-Protected Code Integrity (HVCI) Attackers break-in to endpoint devices to gain access to
hardens the OS against kernel memory attacks. security keys that can unlock connected data, systems and
applications. Intel Key Locker helps protect AES keys on
ChromeOS and Linux OS -based systems by minimizing the
Complement Virtualization with Encryption keys’ exposure, reducing the chances they are compromised.
A comprehensive approach requires hardware-based security
capabilities at every layer, including the encryption of data and Intel Key Locker encrypts and decrypts data with an AES key
endpoint system memory. without the raw key value being present in memory. It converts
AES keys into “handles” that can perform the same encryption
Intel® Total Memory Encryption and decryption operations as the original AES keys, but they
Intel® Total Memory Encryption (Intel® TME) on 11th Gen Intel® only work on the current system, and only until they are
Core™ vPro mobile platform business clients and on 12th gen revoked. If software revokes Key Locker handles (e.g., on a
Intel vPro platforms complements the virtualization security reboot), then any previous handles can no longer be used.
by extending protection against some physical attacks on Once a key handle has been created, the original keys that
DRAM. Intel TME helps protect against cold boot attacks by were wrapped into those handles can be erased from memory.
encrypting DRAM using NIST standard AES-XTS encryption. Intel Key Locker is available on 12th gen Intel vPro platforms
Intel® Advanced Encryption Standard New Instructions (Intel® for ChromeOS.
AES-NI) are used by full disk encryption (FDE) solutions
including Microsoft BitLocker and Google Chrome disk
encryption to protect data at rest, allowing VMs to individually
encrypt storage volumes.
Intel TME leverages Intel expertise in process/circuit design
to help provide data protection through high-performance
and low-power crypto circuits. It is an out-of-box capability
that provides memory data protection for end users’ sensitive/
confidential data if their client system is lost or stolen. Hooks
are available for anti-theft service to wipe out the keys for Intel
TME.
Intel® Total Memory Encryption
Virtualized and containerized environments need granular,
page-level memory encryption. Intel TME-MK enhances Intel
4
Photo or Graphic
Defense In-Depth at Every Layer
White Paper | Use Intel Virtualization Technologies to Help Protect Endpoint Applications & Data without Impacting the User Experience
Advanced Threat Protections
APPS Hardware-powered, AI-enabled threat
detection without a performance hit. Hardware is the bedrock
OS of any security solution,
Application & Data Protections
VM Better protect applications and data and Intel is uniquely
with hardware-accelerated isolation and positioned in the
HYPERVISOR encryption.
industry to create and
Below-the-OS Security
UEFI/BIOS Lock down memory in the BIOS against
deliver truly innovative
CPU firmware attacks and enforce secure hardware- based security
boot at the hardware level. technologies, at scale.
Figure 4. Intel® Hardware Shield is built into Intel vPro® platform business client
systems to help protect against attacks at every layer.
5
White Paper | Use Intel Virtualization Technologies to Help Protect Endpoint Applications & Data without Impacting the User Experience
Intel Hardware Shield Application & Data Protections Features New on 12th Gen Intel® vPro platforms
Generation Consumer Mobile Intel vPro® Intel vPro Intel vPro Additional HW BIOS On by OS HW capability Secured ISV solution
Intel Feature Introduced SKU? SKU? Enterprise Enterprise? Essentials? requirement? integration default? enabling mapped to OS core PC needed?
req't? (Companion req't? req't? feature? req't?
module, extra
HW needed)
Table 1. Intel Hardware Shield features for virtualization and encryption technologies include Intel VT-x, Intel VT-d,
Intel VT-rp, MBEC, Kernel DMA Protection, Intel APICv, Intel AES-NI, Intel TME, Intel TME-MK and Key Locker.
All versions of the Intel vPro® platform require an eligible Intel® Core™ processor, a supported operating system, Intel LAN and/or WLAN silicon, firmware enhancements, and other hard-
ware and software necessary to deliver the manageability use cases, security features, system performance and stability that define the platform. See intel.com/performance-vpro for
details. Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
Intel technologies may require enabled hardware, software or service activation.
Intel does not control or audit third-party data. You should consult other sources to evaluate accuracy.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.
6
1122/MZ/DCC/PDF