Date Published: May 2018
Editor(s)
David Cooper (NIST), Larry Feldman (G2), Gregory Witte (G2)
This bulletin summarizes the information found in the white paper Security Considerations for Code Signing, which describes features and architectural relationships of typical code signing solutions that are widely deployed today. The paper also defines use cases and identifies security problems that can arise when applying code signing solutions to those use cases. Finally, recommendations for avoiding those problems and resources for more information are included.
This bulletin summarizes the information found in the white paper Security Considerations for Code Signing, which describes features and architectural relationships of typical code signing solutions that are widely deployed today. The paper also defines use cases and identifies security problems...
See full abstract
This bulletin summarizes the information found in the white paper Security Considerations for Code Signing, which describes features and architectural relationships of typical code signing solutions that are widely deployed today. The paper also defines use cases and identifies security problems that can arise when applying code signing solutions to those use cases. Finally, recommendations for avoiding those problems and resources for more information are included.
Hide full abstract
Keywords
code signing; digital signature; firmware; software
Control Families
System and Information Integrity