I have secure boot enabled and require signing of kernel modules before loading. The key used for signing is on an external drive to reduce chances of the key being compromised and being used to sign a malicious kernel module. Is there any way to prevent root from disabling secure boot via mokutil --disable-validation
. An attacker could simply disable secure boot validation after shim loads, so the BIOS would have no idea, but unsigned kernel modules could load. This is what I am trying to mitigate or make more difficult.
1 Answer
- Set bios passphrase
- Encrypt your hard drive and store the key somewhere else
- Disable default ssh
- Disable default RDP
- Set strict Firewall rules
As much as I know, no one yet was able to crack or bypass Windows Bitlocker. For Ubuntu, if it is high configured it will be super hard to break through , Else, everything still possible...
mokutil --disable-validation