{"id":6076,"date":"2022-04-13T13:01:34","date_gmt":"2022-04-13T13:01:34","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6076"},"modified":"2022-04-13T13:01:34","modified_gmt":"2022-04-13T13:01:34","slug":"intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/","title":{"rendered":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform"},"content":{"rendered":"<p>This white paper focuses on the recent additions to the Intel\u00ae Hardware Shield banner and explains that together, these technologies provide a hardware-based mechanism that enforces resources access policy on SMI handlers along with an Intel\u00ae TXT hardware rooted attestation. Please contact Abrahams Consulting LLC for more information about the new additions to Intel\u00ae Hardware Shield.<\/p>\n<p><a href=\"https:\/\/stuf.in\/b95ueq\" target=\"_blank\" rel=\"noopener\">View: Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New additions to the #Intel Hardware Shield banner provide a hardware-based mechanism that enforces resources access policy on SMI handlers along with an Intel\u00ae TXT hardware rooted attestation. Read this white paper, courtesy of Abrahams Consulting LLC, to learn more.<\/p>\n","protected":false},"author":2,"featured_media":6075,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-6076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"New additions to the #Intel Hardware Shield banner provide a hardware-based mechanism that enforces resources access policy on SMI handlers along with an Intel\u00ae TXT hardware rooted attestation. Read this white paper, courtesy of Abrahams Consulting LLC, to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-13T13:01:34+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform\",\"datePublished\":\"2022-04-13T13:01:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\"},\"wordCount\":77,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\",\"name\":\"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg\",\"datePublished\":\"2022-04-13T13:01:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg\",\"width\":594,\"height\":792},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/","og_locale":"en_US","og_type":"article","og_title":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times","og_description":"New additions to the #Intel Hardware Shield banner provide a hardware-based mechanism that enforces resources access policy on SMI handlers along with an Intel\u00ae TXT hardware rooted attestation. Read this white paper, courtesy of Abrahams Consulting LLC, to learn more.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/","og_site_name":"TechTonic Times","article_published_time":"2022-04-13T13:01:34+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform","datePublished":"2022-04-13T13:01:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/"},"wordCount":77,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/","name":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg","datePublished":"2022-04-13T13:01:34+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/DRTM_based_computing_whitepaper_FINAL_MAY2021_1_thumb.jpg","width":594,"height":792},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/intel-hardware-shield-trustworthy-smm-on-the-intel-vpro-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Intel\u00ae Hardware Shield: Trustworthy SMM on the Intel vPro\u00ae Platform"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6076"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6075"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}