How to mitigate common security advisories returned by the Intel Attestation Service during remote attestation
Remote attestation on the sgx-ra-sample returns ISV Enclave Trust Status as: Enclave NOT TRUSTED - Reason: CONFIGURATION_AND_SW_HARDENING_NEEDED or CONFIGURATION_NEEDED.
The response from Intel Attestation Service (IAS) included: advisoryIDs = INTEL-SA-00334,INTEL-SA-00161,INTEL-SA-00219,INTEL-SA-00289
Below is a list of common Security Advisories (SAs) returned by the Intel Attestation Service (IAS) and how to mitigate them:
- INTEL-SA-00334: Load Value Injection (LVI) Deep Dive:
- Update the Intel® Software Guard Extensions (Intel® SGX) Platform Software (PSW).
- Build enclaves with the updated toolchain to fully mitigate.
Note If a processor is affected by SA-00334 (LVI), Intel Attestation Service (IAS) will always reply with at least SW_HARDENING_NEEDED. IAS cannot determine if a customer has built their enclaves with the mitigations in place. The relying party needs to look at its enclave's ISVSVN (enclave version) and decide if it's up to date or not. - INTEL-SA-00289: "Plundervolt" - Voltage Settings Modification Advisory:
- Update the BIOS to the latest version from the OEM that exposes the overclocking lock bit.
- Enable the overclocking lock bit if it is exposed in the BIOS. The platform OEM must expose the overclocking lock bit in the BIOS. For Intel customer reference boards, it’s under the BIOS menu Advanced -> Power & Performance -> CPU - Power Management Control -> CPU Lock configuration -> overclocking lock.
- INTEL-SA-00219: Processor Graphics Update Advisory:
- Disable integrated graphics, or use special memory handling techniques in your enclaves. Disabling integrated graphics is required to clear this response.
- INTEL-SA-00161: “L1TF” - Speculative Execution Side Channel - uCode update as part of INTEL-SA-00115. Disable hyperthreading
Note | All Security Advisories must be mitigated in order to remove any of the advisories. If you mitigate only one of the security advisories, it will still show up because not all of them were mitigated. |
The response from the Intel Attestation Service, the Attestation Verification Report, may include the Intel Security Advisories that address the vulnerabilities found in the platform being attested. The Verification Report provides this information to the relying third party so that the third party can decide, based on policy, whether to trust the platform.
The platform owner or ISV should read each Security Advisory to learn how to mitigate each vulnerability.