Surface security overview
Recent advances in security research demonstrate that as more protections are built into the OS and connected services, attackers are looking for other avenues of exploitation with firmware emerging as a top target.
Today, managing device firmware is an inconsistent experience and often involves third-party providers making firmware challenging to monitor and complicated to maintain. Ultimately, this can limit the ability of hardware manufacturers to detect and push out timely updates in response to threats.
Microsoft Surface has been using a unified approach to firmware protection and device security since 2015 through complete end-to-end ownership of the hardware design, in-house firmware development, and a holistic approach to device updates and management.
For Surface, our Unified Extensible Firmware Interface (UEFI)1 is maintained in-house, regularly updated through Windows Update, and seamlessly deployed for management through Windows Autopilot, minimizing risk and maximizing control at the firmware level before the device boots. Microsoft provides full transparency of the codebase in our UEFI through the Open Source Project Mu on GitHub, managed by Microsoft Intune admin center.
Microsoft designed and built components
Every layer of Surface from chip to cloud is maintained by Microsoft, giving you ultimate control, proactive protection, and peace of mind wherever and however work gets done. Surface devices ship with the strongest security protocols Microsoft offers and enables streamlined management that reduces IT complexity and helps users stay focused on their work.
Surface drives security through a defense-in-depth approach by utilizing a layering of independent defensive sub-components. From chip to cloud, or a UEFI that ensures a Root of Trust to the AI-powered Microsoft Defender for Endpoint that works to prevent, detect, investigate, and respond to advanced threats, Surface enforces the position that built-in from Microsoft is better than bolt-on.
|Microsoft Built UEFI
|Software that configures the device and boots Windows 10
Controls initial boot of device and Windows 10, then provides firmware runtime services to the OS. ensures significantly more control over the hardware of a device through SEMM on-prem management and DFCI cloud-based management through Microsoft Intune admin center
|Manage Surface UEFI settings
|Physical TPM 2.0
|Trusted Platform Module - Dedicated microcontroller designed to secure hardware through integrated cryptographic keys.
Encrypts and stores keys (BitLocker, Windows Hello, AD Credentials)
PCR - Platform Configuration Registers that secure measurements and relevant metrics to detect changes to previous configuration
|Trusted Platform Module Technology Overview
|Windows Hello for Business
|Replaces passwords with strong two-factor authentication on PCs and mobile devices. This biometric authentication consists of a new type of user credential that is tied to a device.
|How Windows Hello for Business works - Microsoft 365 Security
|Integrated encryption is enabled by BitLocker to secure and encrypt your data, and Windows Hello to enable passwordless login, combined with physical TPM and UEFI.
|BitLocker (Windows 10) - Microsoft 365 Security
|Microsoft Defender for Endpoint
|Provides an enterprise endpoint security platform designed to help networks prevent, detect, investigate, and respond to advanced threats.
|Microsoft Defender for Endpoint
Factory level security protocols and inspection
From firmware to the operating system and every hardware component before final assembly, Surface devices are safe from supply chain attacks in our physically secured development and manufacturing facilities.
By definition, a secure supply chain delivers finished products that meet quality, performance, and operational goals. Simply put, a secure supply chain ensures that all components are genuine and free of unauthorized or malicious manipulation or sabotage. We manufacture devices in highly secured factories where everything from the UEFI firmware to the operating system comes directly from Microsoft. No third-party BIOS vendors are involved. This is a strong part of how we protect against supply chain attacks for Surface products. We have reduced the attack Surface in our UEFI by removing any unused code, including system management mode SMM functions that our devices do not need.
Protecting facilities from external Internet-based attacks, intrusion, and other threats requires an ongoing investment across critical areas including:
- Rigorous inspection and testing of all components at final assembly locations.
- Maintaining high levels of physical security at the factory.
- Use of only Microsoft maintained firmware, drivers, and OS.
- Secure logistics and trusted carrier delivery of Surface devices direct to Microsoft resellers.
Upon leaving the factory, Surface for Business devices are protected via Windows Update throughout the lifecycle.
Advanced Windows security features
Escalation of privilege attacks is a malicious actor's best friend, and they often target sensitive information stored in memory. These kinds of attacks can turn a minor user mode compromise into a total compromise of your OS and device. To combat these kinds of attacks, Microsoft developed virtualization-based security (VBS) and Hypervisor-protected code integrity (HVCI, also commonly referred to as memory integrity). VBS and HVCI use the power of hardware capabilities like virtualization to provide better protection against common and sophisticated malware by performing sensitive security operations in an isolated environment.
Surface ships with these Windows enhanced hardware security features enabled out of the box to give customers even more robust security that is built in and turned on by default.
Virtualization-based security, or VBS, uses hardware virtualization features to create and isolate a secure region of memory from the regular operating system. Windows can use this "virtual secure mode" to host a number of security solutions, providing them with significantly increased protection from vulnerabilities in the operating system, and preventing the use of malicious exploits which attempt to defeat protections.
Hypervisor-Enforced Code Integrity (HVCI)
HVCI uses VBS to significantly strengthen code integrity policy enforcement. Kernel-mode code integrity checks all kernel-mode drivers and binaries before they're started and prevents unsigned drivers or system files from being loaded into system memory. As shown in the following diagram, HVCI runs in an isolated execution environment and verifies the integrity of the kernel code according to kernel signing policy.
Both VBS and HVCI are enabled out of the box in the following Surface devices:
- Surface Pro 8
- Surface Pro 9
- Surface Pro 9 with 5G
- Surface Laptop Studio
- Surface Go 3
- Surface Laptop 4
- Surface Laptop 5
- Surface Pro 7+
- Surface Book 3
- Surface Laptop Go
- Surface Laptop Go 2
- Surface Pro X
- Surface Studio 2+
Secure boot and boot guard
Surface devices' Root of Trust checks signatures and measurements to ensure each stage is secure and authentic before allowing the next phase of boot to proceed. Enabled by UEFI and TPM 2.0, Secure Boot ensures that only code signed, measured, and correctly implemented code can execute on a Surface device.
As shown in the following figure, the integrity of the firmware is checked at each stage from pressing the power button to running the operating system.
Figure 1. Secure Boot for Surface devices
|Secure Boot Phase
|Security is instantiated every time the power button is pressed from a root of trust provided by the TPM. When a device is first powered on, the system runs a series of security checks to ensure device firmware has not been tampered with or corrupted.
|When powered on, the SoC uses a chipset vendor key to validate and initiates the loading of microcode using the Authenticated Code Module (ACM) (on Intel-based devices).
|The ACM measures the UEFI code before loading and compares it to the known measurement in the TPM's Platform Configuration Register [PCR] to ensure the UEFI code has not been altered.
|Before allowing UEFI to run, Boot Guard checks that the UEFI is signed with a Surface OEM key. The initially checked UEFI module is the SEC security and the PEI Pre-EFI sections shown in the diagram.
|The PEI section checks for a Surface signature on the driver execution environment, the DXE module, as it is loaded. The DXE module includes the boot device selection phase.
|Once the boot device is selected, UEFI reads the boot device and checks the signature of the OS boot loader before allowing it to execute.
|The OS then checks its signatures on its main component as it brings up the OS.
To help protect your device from malicious software attacks, Surface enables Secure boot to ensure an authentic version of Windows 10 is started and that the firmware is as genuine as it was when it left the factory.
The SoC on Surface devices has a security processor separate from every other core. When you first start a Surface device, only the security processor starts before anything else can be loaded. Secure Boot is used to verify that the boot process components, including drivers and the operating system, are validated against a database of valid and known signatures. This helps prevent attacks from a cloned or modified system running malicious code hidden in what appears to be an otherwise everyday user experience. For more information, see Secure Boot overview.
Once the operating system is verified as originating from Microsoft and your Surface device completes the boot process, the device scrutinizes the executable code. Our approach to securing the operating system involves identifying the code signature of all executables, allowing only those that pass our restrictions to be loaded into the runtime. This code signing method enables the operating system to verify the author and confirm that code was not altered before running on the device.
DRTM protection in AMD devices
Surface devices containing AMD processors equivalently implement Secure Boot. Surface Laptop 4 with AMD Ryzen Microsoft Surface Edition processor protects firmware from the initial power-on using Dynamic Root of Trust Measurements (DRTM).DRTM controls all the CPUs, forcing execution along a measured path, and reestablishes trust at various stages to verify the integrity of the system firmware/software. Transitioning into this trusted state early provides added protection against potential attacks in the boot stages.
DRTM protects measurements by encrypting them using Total System Memory Encryption (TSME). Once TSME is set, it cannot be cleared except by a system reset. A new encryption key for each reset ensures single-use encryption for security.
Runtime calls to System Management Mode (SMM) execute at the highest level, which can be risky if the SMM code has any issues. Surface Laptop 4 with AMD Ryzen guards the system by intercepting the System Management Interrupts (SMI) and dispatches the execution of the SMM code to a lesser level (user) to protect the system from invalid access to code and data. SMM protection uses hardware protections to restrict the code, data, and system resources that can be accessed, further enforcing protection against inadvertent or malicious incidents.
Surface Laptop 4 with AMD Ryzen supports NIST 800-193 Platform Firmware Resiliency Guidelines, in addition to the robust firmware update support. The resilient update mechanism for boot firmware uses an A-B Recovery mechanism that provides auto-recovery to a backup copy of firmware should the boot sequence detect a corrupted copy of the firmware during boot.
To learn more about DRTM and SMM, see How a Windows Defender System Guard helps protect Windows 10.
Remote device management control
IT admins can remotely manage Surface devices without physically touching every device. Microsoft Intune admin center with Intune and Windows Autopilot enables full remote management of Surface devices from the Azure Cloud, delivering fully configured devices to users upon startup. Wipe and retire features allow IT to repurpose a device easily for a new remote user and wipe a device that's been stolen. This enables rapid and secure response capabilities in the event of loss or theft of a Surface device allowing you to remotely remove all company data and reconfigure Surface as an entirely new device.
|DCFI (Device Firmware Configuration Interface)
|Delivers cloud-scale remote firmware management with zero-touch device provisioning. Microsoft's UEFI allows stronger DCFI implementation, enabling organizations to disable hardware elements and remotely lock UEFI using Intune. ¹
|Intune management of Surface UEFI settings
Manage Surface UEFI settings
|SEMM (Surface Enterprise Management Mode)
|Enables centralized enterprise engagement of UEFI firmware settings across on-premises, hybrid, and cloud environments.¹
|Surface Enterprise Management Mode
|Windows Update for Business
|Enables IT admins to keep the Windows 10 devices in their organization continually updated with the latest security defenses, Windows features, and Surface firmware by directly connecting these systems to the Windows Update service. You can use Group Policy or MDM solutions such as Microsoft Intune to configure the Windows Update for Business settings that control how and when Surface devices are updated.
|Windows Update for Business
Manage and deploy Surface driver and firmware updates
- Surface Go and Surface Go 2 use a third-party UEFI and do not support DFCI. DFCI is currently available for Surface Studio 2+, Surface Pro 9 & Surface Pro 9 with 5G, Surface Laptop 5, Surface Laptop 4, Surface Laptop 3, Surface Laptop Studio, Surface Book 3, Surface Laptop SE, Surface Laptop Go 2, Surface Laptop Go, Surface Pro 8, Surface Pro 7+, Surface Pro 7, Surface Pro X, and Surface Go 3.
- New Surface PCs enable virtualization-based security (VBS) by default to empower customers to do more, securely
- Study highlights critical role of Surface firmware protection
- Enhancing security and compliance with Microsoft Surface and Microsoft 365
- Manage Surface UEFI settings
- Intune management of Surface UEFI settings
- Project Mu