S 6.27 Secure update of BIOS

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User

Many IT systems, for example PCs, require a Basic Input/Output System (BIOS) for start and/or operation. This BIOS is comprised of a program code and data and is used to carry out important configuration settings on the IT system and to provide elementary input/output functions. In many cases, the actual operating system is loaded with these functions, which then either takes over the control over the hardware itself or continues to use the BIOS functions. In most cases, the BIOS is stored in special memory modules (e.g. EEPROM or Flash-EPROM) the contents of which are also maintained when switching off the power supply.

For PCs in particular, the large number of configuration options has caused the BIOS to become very complex and thus also more prone to error. Many manufacturers have therefore started to implement an update mechanism for the BIOS and to provide bug-fixed versions of the BIOS at regular intervals. To perform the BIOS updates, the manufacturer usually also offers a special program, with which the contents of the corresponding memory modules can be overwritten. If a special program is offered for the BIOS update, it must be ensured that is obtained from a trusted source, that it is up-to-date and free of viruses.

Since the BIOS accesses the hardware directly and is loaded before operating systems and boot loaders, it is particularly difficult to detect manipulations to the BIOS. For this reason, only administrators may be entitled to install a new BIOS.

In general, the update mechanism for the BIOS should be used to equip IT systems with BIOS versions with as few errors as possible. The following aspects, however, should be considered in this context:

Review questions: