Learn how organizations can apply the core concepts of Zero Trust to mitigate their risk and prevent firmware based attacks such as DMA attacks, with the goal in mind to provide vendors, validation teams, and IT and Security teams with a practical approach to improve their security going forward. Specifically, this example will:
- Introduce DMA and firmware-level attacks and their security impact on a device.
- Provide an overview of Zero Trust principles and how they relate to DMA attacks and supply chain security.
- Propose a set of specific best practices and tests that can be applied to ensure the integrity of SSDs through all phases of the supply chain.
Learn about the role of firmware in preventing DMA attacks and achieving a Zero Trust posture.