

And this is why the announcement of Project Aurora is so significant. Project Aurora was able to detect it in as little as two seconds. Compare this with the 200 plus days such an attack can go undetected. In internal testing, the company recreated the Drovorub rootkit. With Project Aurora, HPE claims to have an answer to these attacks. And other malware based in rootkits and bootkits can stay undetected for over 200 days, according to that aforementioned Ponemon report. As a result, ransomware goes undetected for 24 days. Meaning, they’re not fully integrated and do not establish that chain-of-trust up the stack and across the environments. The IT market is flooded with very compelling point solutions. And it doesn’t matter how much you spend on cybersecurity every year. It doesn’t matter what vertical industry you are in. It doesn’t matter how big your company is. Your environment and data is at risk, and that risk profile grows more and more every day. If the introduction in this article didn’t appropriately freak you out, let’s get a little more direct. You can get a deeper look at how Project Aurora works by reading this Moor Insights & Strategy research paper. This same security is replicated at the edge and in the cloud, enabling a uniform and securely integrated environment. This continues from the OS to the platform (middleware, container environment, etc.), to the workloads and data. This assures no vulnerabilities are left to exploitation.įrom infrastructure trust, a secure hand off is made to OS trust, whereby a baseline measurement is made and continuously validated through scanning agents. If you see some overlap between infrastructure trust and secure supply chain, this is by design and the result of this zero-trust approach taken by HPE. The company’s silicon root of trust technology and continuous scanning validates the five million or so lines of code the system executes before a server boots, while also verifying the drivers and firmware used to support the server environment. Once this validation takes place, a secure and validated handoff is made to Project Aurora, beginning with infrastructure trust. And once a server is manufactured and racked in a datacenter, through platform certificates and cryptographic signatures (IDevID) assure the components in that server are what left the assembly line.

This includes a physical presence on the floors of suppliers, audits, and secure manufacturing. It’s important to note that before Project Aurora is instantiated, a rooted chain-of-trust is established with HPE’s secure supply chain. Establishing a chain of trust with Project Aurora Moor Insights & Strategy
