Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Security Best Practices and Guidance

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

Security Best Practices and Guidance

  

Access Intel Security Insight

Security is a shared concern. We contribute our security learnings and expertise to benefit the global community through participation in industry events and governance bodies, through direct engagements, and by sponsoring academic programs that mentor future security professionals. Following is a selection of security best practices Intel has published.
 

Securing Workloads Against Side Channels

An overview of the types of incidental channels in CPUs, the security threat these incidental channels can pose, Intel’s position on incidental channels, and strategies to mitigate the risks. 

 

Learn more
Mitigating Timing Side Channels Against Cryptographic Implementations

The primary concern with side channels is the protection of secrets. Secrets are broadly defined as any data that shouldn’t be seen or known by other users, applications, or even other code modules. When using side channel methods, potential malicious actors most commonly seek: API keys, user passwords, and cryptographic key. These resources may allow potential malicious actors to decrypt or access other protected secrets.

 

Learn more
Microcode Update Guidance

This document describes details about the microcode update (MCU) process on current Intel processors. It includes the points when a microcode update may be loaded (Firmware Interface Table, BIOS, OS, and runtime) as well as guidelines for microcode updates.

 

Learn more
Security Best Practices for Side Channel Resistance

Developers can employ security best practices to help protect against various types of potential side channel attacks and provide defense in depth. These include using the latest software version, not sharing resources when sharing can be avoided, limiting error messages, writing constant timing code, and being aware of compiler optimizations. To prioritize side channel defense, consider the threat model of your applications.

 

Learn more
Refined Speculative Execution Terminology

Current terminology being used to describe speculative execution side channel vulnerabilities can be imprecise in certain situations. Intel seeks to introduce a unified terminology that is concise and unambiguous, while also reasonably aligning with the research community. Intel plans to adopt the terms in this article for future guidance. 

 

Learn more

  

  

  

Software Security Guidance

Are you a software developer or system admin looking for resources to help you assess risk and build more secure solutions? We’ve designed a site for you. The Intel Developer Zone includes guidance on designing solutions with security in mind, including best practices for cryptography, software-based mitigations and affected processors by vulnerability for side channels.

Visit the Software Security Guidance Site
View detailed analysis and mitigations for Intel-supported issues

  

Insight from Intel Experts

Chips & Salsa Videos

Original. Sometimes irreverent. Always insightful. This video series highlights topics, ranging from Intel security advisories to product assurance programs, and other areas of interest.

Learn more

Cybersecurity Inside Podcast

Cybersecurity is not just for coders and hackers. CISOs and their executive peers need to think about security differently. This podcast, covers relevant topics in clear, easy to understand language.

Listen

Product and Security Assurance

The Intel platform update (IPU) helps simplify the update process and improve predictability for customers and partners.

Learn more

Product Security Report

Intel’s annual product security report provides a look at the results of our investment in security assurance. It shows who’s looking and what they’re finding: a level of transparency our customers expect.

Learn more

Show more Show less

More Information

Intel Security Development Lifecycle

Secure Development Practices Overview

Threat Modeling

Security Architecture Reviews

Security Development Tools

Security Validation

Hackathons

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo