{"id":214476,"date":"2019-02-02T23:16:54","date_gmt":"2019-02-02T22:16:54","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=214476"},"modified":"2021-09-28T12:23:56","modified_gmt":"2021-09-28T10:23:56","slug":"aktualisierter-nsa-leitlinien-zu-side-channel-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/02\/02\/aktualisierter-nsa-leitlinien-zu-side-channel-schwachstellen\/","title":{"rendered":"Aktualisierte NSA-Leitlinien zu Side-Channel-Schwachstellen"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Kurze Information zum Wochenende. Der US-Geheimdienst NSA hat am 1. Februar 2019 aktualisierte Leitlinien zu Side-Channel-Schwachstellen ver\u00f6ffentlicht.<\/p>\n<p><!--more--><\/p>\n<p>Erste Informationen zu Schwachstellen in CPUs wurden ja vor einem Jahr unter den Begriffen Meltdown und Spectre bekannt \u2013 ich hatte im Blog dar\u00fcber berichtet. Im Jahr 2018 wurden dann weitere Varianten von Seitenkanalangriffen ver\u00f6ffentlicht. \u00dcber meine Twitter-Kan\u00e4le wurde ich auf <a href=\"https:\/\/twitter.com\/tweet_alqamar\/status\/1091757026882080768\" target=\"_blank\" rel=\"noopener\">diese Diskussion<\/a> aufmerksam.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">WHAT BEGAN 2018? M&amp;S FROM NSA, SPEED UP: SECURITY <a href=\"https:\/\/twitter.com\/hashtag\/1February?src=hash&amp;ref_src=twsrc%5Etfw\">#1February<\/a><\/p>\n<p>Thank You: <a href=\"https:\/\/twitter.com\/SBSDiva?ref_src=twsrc%5Etfw\">@SBSDiva<\/a><\/p>\n<p>ICYMI: <a href=\"https:\/\/twitter.com\/AskWoody?ref_src=twsrc%5Etfw\">@AskWoody<\/a> <a href=\"https:\/\/twitter.com\/AdminKirsty?ref_src=twsrc%5Etfw\">@AdminKirsty<\/a> <a href=\"https:\/\/twitter.com\/thurrott?ref_src=twsrc%5Etfw\">@thurrott<\/a> <a href=\"https:\/\/twitter.com\/maryjofoley?ref_src=twsrc%5Etfw\">@maryjofoley<\/a> <a href=\"https:\/\/twitter.com\/bdsams?ref_src=twsrc%5Etfw\">@bdsams<\/a> <a href=\"https:\/\/twitter.com\/mehedih_?ref_src=twsrc%5Etfw\">@mehedih_<\/a> <a href=\"https:\/\/twitter.com\/ruthm?ref_src=twsrc%5Etfw\">@ruthm<\/a> <a href=\"https:\/\/twitter.com\/SwiftOnSecurity?ref_src=twsrc%5Etfw\">@SwiftOnSecurity<\/a> <a href=\"https:\/\/twitter.com\/pcper?ref_src=twsrc%5Etfw\">@pcper<\/a> <a href=\"https:\/\/twitter.com\/MalwareJake?ref_src=twsrc%5Etfw\">@MalwareJake<\/a> @GossiTheDog <a href=\"https:\/\/twitter.com\/tweet_alqamar?ref_src=twsrc%5Etfw\">@tweet_alqamar<\/a> <a href=\"https:\/\/twitter.com\/JobCacka?ref_src=twsrc%5Etfw\">@JobCacka<\/a> <a href=\"https:\/\/twitter.com\/etguenni?ref_src=twsrc%5Etfw\">@etguenni<\/a><a href=\"https:\/\/t.co\/rrYnRuVwkJ\">https:\/\/t.co\/rrYnRuVwkJ<\/a><\/p>\n<p>1\/4<\/p>\n<p>\u2014 Crysta T. Lacey (@PhantomofMobile) <a href=\"https:\/\/twitter.com\/PhantomofMobile\/status\/1091485559619411968?ref_src=twsrc%5Etfw\">1. Februar 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Das US-CERT weist seit dem 1. Februar 2019 auf folgendes hin: Das National Cybersecurity and Communications Integration Center (NCCIC), welches Teil der Cybersecurity and Infrastructure Security Agency (CISA) ist, ermutigt Benutzer und Administratoren, die NSA Cybersecurity Advisory zu \u00fcberpr\u00fcfen. Die National Security Agency (NSA) hat zwei Dokumente dazu online gestellt:<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201220141700\/https:\/\/www.nsa.gov\/Portals\/70\/documents\/what-we-do\/cybersecurity\/professional-resources\/CSA_Updated_Guidance_For_Vulnerabilities_Affecting_Modern_Processors_20190130.pdf?ver=2019-01-30-142631-553\" target=\"_blank\" rel=\"noopener\">Updated Guidance for Vulnerabilities Affecting Modern Processors<\/a><br \/>\n<a href=\"https:\/\/github.com\/nsacyber\/Hardware-and-Firmware-Security-Guidance\" target=\"_blank\" rel=\"noopener\">Hardware and Firmware Security Guidance GitHub website<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kurze Information zum Wochenende. Der US-Geheimdienst NSA hat am 1. Februar 2019 aktualisierte Leitlinien zu Side-Channel-Schwachstellen ver\u00f6ffentlicht.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-214476","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/214476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=214476"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/214476\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=214476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=214476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=214476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}