Secure Kernel Code Integrity

Certificate #3651

Webpage information

Status historical
Historical reason Moved to historical list due to dependency on certificate #3615
Validation dates 07.05.2020 , 05.10.2022
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with module Windows OS Loader validated to FIPS 140-2 under Cert. #3615 operating in FIPS mode
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 2
Description Secure Kernel Code Integrity (SKCI) running in the Virtual Secure Mode (VSM) of the Hyper-V hypervisor will only grant execute access to physical pages in the kernel that have been successfully verified. Executable pages will not have write permission outside of Hyper-V. Therefore, only verified code can be executed.
Tested configurations
  • Azure Data Box Edge (x64) running on a Microsoft Azure Data Box with an Intel Xeon Silver without PAA[1]
  • Windows 10 Education October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Studio with an Intel Core i7 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on a Samsung Galaxy Book 12" with an Intel Core i5 without PAA[1]
  • Windows 10 Enterprise October 2018 Update (x64) running on an HP EliteBook x360 1030 G2 with an Intel Core i7 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Dell Latitude 12 Rugged Tablet with an Intel Core i5 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Dell Latitude 5290 with an Intel Core i7 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Go with an Intel Pentium without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on a Samsung Galaxy Book 10.6" with an Intel Core m3 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on an HP Elite x2 1013 G3 Tablet with an Intel Core i7 without PAA[1]
  • Windows 10 Pro October 2018 Update (x64) running on an HP Slimline Desktop with an Intel Pentium with PAA[1]
  • Windows Server 2019 Core (x64) on Hyper-V on Windows Server 2016 running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]
  • Windows Server 2019 Core (x64) on Hyper-V on Windows Server 2019 running on a Dell Precision Tower 5810MT with an Intel Xeon E5 without PAA[1]
  • Windows Server 2019 Core (x64) running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]
  • Windows Server 2019 Datacenter Core (x64) on Hyper-V on Windows Server 2019 running on a Dell Precision Tower 5810MT with an Intel Xeon E5 without PAA[1]
  • Windows Server 2019 Datacenter Core (x64) running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]
  • Windows Server Core Datacenter 2019 RTM (x64) running on an HPE Edgeline EL8000 / ProLiant e910 Server Blade with PAA[2] (single-user mode)
Vendor Microsoft Corporation
References

This certificate's webpage directly references 1 certificates, transitively this expands into 2 certificates.

Security policy

Symmetric Algorithms
AES
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA-2, SHA2
Protocols
SSL

Vendor
Samsung, Microsoft, Microsoft Corporation

Standards
FIPS 140, FIPS 140-2, FIPS 186-4, FIPS 180-4, PKCS#1

File metadata

Creation date D:20220921144941-04'00'
Modification date D:20220921144941-04'00'
Pages 22
Creator Nuance PDF Create
Producer Nuance PDF Create

References

Incoming
  • 3690 - historical - Virtual TPM
  • 3197 - historical - Cryptographic Primitives Library
  • 3092 - historical - BitLocker Dump Filter

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3651,
  "dgst": "0ab77c56eece2d24",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHS#C2047",
        "RSA#C211",
        "RSA#C349",
        "SHS#C211",
        "RSA#C2047"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3092",
          "3197",
          "3690"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3615"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3092",
          "4289",
          "3690",
          "4275",
          "4288",
          "4300",
          "4290",
          "3197"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3615",
          "3089"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "3615"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3092",
          "3197",
          "3690"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3092",
          "4289",
          "3099",
          "2472",
          "2549",
          "3690",
          "4275",
          "4288",
          "4300",
          "2484",
          "4290",
          "2471",
          "3197"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "PKCS#1": 6,
          "RSA PKCS#1": 4,
          "SHA- 256": 1,
          "SHA- 512": 1,
          "SHA-1": 5,
          "SHA-2": 2,
          "SHA-256": 7,
          "SHA-384": 3,
          "SHA-512": 4,
          "SHA1": 2,
          "SHA2": 1
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 7,
            "SHA-384": 3,
            "SHA-512": 4,
            "SHA2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 4,
          "FIPS 140-2": 6,
          "FIPS 180-4": 4,
          "FIPS 186-4": 4
        },
        "PKCS": {
          "PKCS#1": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 54,
          "Microsoft Corporation": 3
        },
        "Samsung": {
          "Samsung": 2
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20220921144941-04\u002700\u0027",
      "/Creator": "Nuance PDF Create",
      "/ModDate": "D:20220921144941-04\u002700\u0027",
      "/Producer": "Nuance PDF Create",
      "pdf_file_size_bytes": 558393,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "c3db1ac50cf492cb87f39e78e3f226564596ccf1f3eb518bd6a1796cec001629",
    "policy_txt_hash": "2ed639ebae177a801d27142a5c4a8b7d1ac313143ff1ff3100297caed537ce3d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with module Windows OS Loader validated to FIPS 140-2 under Cert. #3615 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2020_010620_1115.pdf",
    "date_sunset": null,
    "description": "Secure Kernel Code Integrity (SKCI) running in the Virtual Secure Mode (VSM) of the Hyper-V hypervisor will only grant execute access to physical pages in the kernel that have been successfully verified. Executable pages will not have write permission outside of Hyper-V. Therefore, only verified code can be executed.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 2"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to dependency on certificate #3615",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "3615": 1
    },
    "module_name": "Secure Kernel Code Integrity",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "10.0.17763[1] and 10.0.17763.107[2]",
    "tested_conf": [
      "Azure Data Box Edge (x64) running on a Microsoft Azure Data Box with an Intel Xeon Silver without PAA[1]",
      "Windows 10 Education October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on a Microsoft Surface Studio with an Intel Core i7 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on a Samsung Galaxy Book 12\" with an Intel Core i5 without PAA[1]",
      "Windows 10 Enterprise October 2018 Update (x64) running on an HP EliteBook x360 1030 G2 with an Intel Core i7 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Dell Latitude 12 Rugged Tablet with an Intel Core i5 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Dell Latitude 5290 with an Intel Core i7 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Go with an Intel Pentium without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Laptop with an Intel Core i5 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on a Samsung Galaxy Book 10.6\" with an Intel Core m3 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on an HP Elite x2 1013 G3 Tablet with an Intel Core i7 without PAA[1]",
      "Windows 10 Pro October 2018 Update (x64) running on an HP Slimline Desktop with an Intel Pentium with PAA[1]",
      "Windows Server 2019 Core (x64) on Hyper-V on Windows Server 2016 running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]",
      "Windows Server 2019 Core (x64) on Hyper-V on Windows Server 2019 running on a Dell Precision Tower 5810MT with an Intel Xeon E5 without PAA[1]",
      "Windows Server 2019 Core (x64) running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]",
      "Windows Server 2019 Datacenter Core (x64) on Hyper-V on Windows Server 2019 running on a Dell Precision Tower 5810MT with an Intel Xeon E5 without PAA[1]",
      "Windows Server 2019 Datacenter Core (x64) running on a Dell PowerEdge R740 Server with an Intel Xeon Gold without PAA[1]",
      "Windows Server Core Datacenter 2019 RTM (x64) running on an HPE Edgeline EL8000 / ProLiant e910 Server Blade with PAA[2] (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-05-07",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-10-05",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}