Bootstrapping and securely configuring devices
Secure bootstrapping concerns the processes associated with the initial provisioning of passwords, credentials, network information, and other parameters to the devices and the enterprise systems that need to be aware of the devices. When new devices are incorporated into a network, it is vital that they be distinguished as being legitimate rather than rogue or hostile devices. Secure bootstrapping consists of the security processes necessary to ensure that a new (or reintroduced) device undergoes the following:
- Registers, either directly or indirectly, its identity to the network and/or the backend systems to which it connects
- Receives knowledge of the network and backend system and server identities—this will frequently be in the form of installing default cryptographic credentials (trust anchors and trust paths)
- Receives a secure configuration that has been well vetted according to a security policy
- Receives knowledge of its network, subnet,...