CISSP · · 5 min read

Securing the Hardware Platform: CPUs, Memory, Firmware, and the Attacks That Target Them

Hardware is an attack surface. Learn CPU protection rings, TPM, firmware security, and side-channel attacks for CISSP Domain 3.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Spectre, Meltdown, and firmware rootkits proved that hardware is an attack surface. If you treat security as starting at the operating system, you have already lost the bottom layer. The CISSP expects you to understand what the hardware does for security and where it falls short.

Core Concept Explained Simply

Hardware security encompasses the physical computing components that underpin all software-based controls. If the hardware is compromised, no operating system, application, or encryption can compensate. Understanding hardware security means knowing how processors enforce privilege, how memory is protected, and how firmware integrity is maintained.

CPU Protection Rings

Modern processors implement a privilege model using protection rings, numbered 0 through 3:

The CPU enforces these boundaries in hardware. A process running in Ring 3 cannot directly access Ring 0 memory or execute privileged instructions. This is the foundation of process isolation.

Some modern systems also use Ring -1 (hypervisor mode) for virtualization, giving the hypervisor a privilege level below the OS kernel.

Process Isolation and Memory Protection

Operating systems use hardware features to prevent processes from interfering with each other:

Together, these mechanisms ensure that a crash or compromise in one process does not automatically affect others. They are hardware-enforced, not just software conventions.

Trusted Platform Module (TPM)

A TPM is a dedicated hardware chip (or firmware-based implementation) that provides:

TPM is a root of trust for platform integrity. It does not prevent attacks, but it detects tampering and ensures the system started from a trusted baseline.

Secure Boot and UEFI Security

Secure boot verifies that each piece of software loaded during startup is signed by a trusted authority. The UEFI firmware checks the bootloader signature before execution, the bootloader checks the kernel, and the chain continues. If any component is unsigned or tampered with, the boot process halts.

This prevents boot-level malware (bootkits) that load before the operating system and therefore evade OS-level security controls.

Hardware Security Modules (HSMs)

HSMs are dedicated hardware devices for cryptographic key management. Unlike TPMs (which are embedded in the platform), HSMs are standalone devices or PCIe cards designed for high-performance cryptographic operations. They provide tamper-resistant key storage and are used for CA key protection, payment processing, and other high-value cryptographic operations.

Do not confuse TPM and HSM. TPM provides platform integrity and basic key storage. HSM provides high-performance, tamper-resistant cryptographic processing for enterprise key management.

Side-Channel Attacks

Side-channel attacks exploit physical characteristics of hardware implementation rather than logical flaws:

These attacks are significant because they bypass logical security controls entirely. Software patches can mitigate some variants, but the underlying vulnerability is in the hardware.

Firmware Security

Firmware operates below the operating system and is among the hardest layers to inspect or protect. A compromised firmware can persist across OS reinstalls, survive hard drive replacements, and evade all software-based detection. Firmware integrity verification during boot (via secure boot and TPM) is the primary defense.

Emanation Security (TEMPEST)

Electronic equipment emits electromagnetic radiation that can be intercepted and analyzed to reconstruct the data being processed. TEMPEST is a government standard for shielding equipment and facilities against electromagnetic emanation. While primarily relevant to classified environments, the concept applies anywhere sensitive data is processed near untrusted boundaries.

CISSP Lens

The exam tests protection rings (know which ring the kernel occupies and why Ring 0 compromise is significant), TPM as a root of trust, and the distinction between TPM and HSM. TEMPEST is a recognized term that appears in exam questions about emanation security.

Side-channel attacks may appear in scenario questions describing attacks that do not target software vulnerabilities. If the question describes an attack based on physical measurements (power, timing, electromagnetic emissions), the answer involves side-channel attacks.

Real-World Scenario

An organization discovered during a security audit that firmware on several servers had been modified. The modification came through a compromised vendor supply chain: a firmware update package was tampered with before distribution. The malicious firmware installed a persistent backdoor that operated below the OS, invisible to endpoint detection tools and antivirus.

The organization had not enabled secure boot or TPM attestation on those servers. Post-incident, they enabled secure boot across all systems, deployed TPM-based integrity monitoring that compared boot measurements against known-good baselines, and established a firmware update validation process requiring cryptographic signature verification before any firmware update is applied.

Common Mistakes and Misconceptions

Actionable Checklist

Key Takeaways

Exam-Style Reflection Question

An attacker gains access to Ring 0 on a system. What level of access does this represent, and why is it significant?

Answer: Ring 0 is the kernel level, the highest privilege level in the CPU protection ring model. An attacker at Ring 0 has complete control over the system, including all memory, hardware, and processes. This is significant because no software-based security control running at a higher ring number can detect or prevent actions taken at Ring 0.

Read next

© 2025 Threat On The Wire. All rights reserved.