Security User Guide: Intel® FPGA Programmable Acceleration Card N3000 Variants

ID 683519
Date 9/08/2020
Public
Document Table of Contents

2. Intel® FPGA PAC Security Features

The Intel® MAX® 10 board management controller (BMC) acts as a Root of Trust (RoT) and enables the secure update features of the Intel® FPGA PAC. The RoT includes features that may help prevent the following:

  • Loading or executing of unauthorized code or designs.
  • Disruptive operations attempted by unprivileged software, privileged software, or the host BMC.
  • Unintended execution of older code or designs with known bugs or vulnerabilities by enabling the BMC to revoke authorization.
The Intel® FPGA PAC BMC also enforces several other security policies relating to access through various interfaces, as well as protecting the on-board flash through write rate limitation.
Note: The terms BMC or BMC RoT refer to the Intel® FPGA PAC's Intel® MAX® 10 BMC (as opposed to another BMC, such as the host or motherboard BMC) unless otherwise noted.

The BMC verifies Intel® MAX® 10 BMC Nios® firmware and Intel® MAX® 10 FPGA images

The Intel® FPGA PAC N3000 BMC RoT is programmed with Intel root entry hashes for BMC firmware, and BMC RTL images during a one-time secure update (OTSU) to preproduction units or at manufacturing, but does not contain a root entry hash for AFUs.
Note: This operation cannot be reversed, and after this operation, AFUs without correct signatures are refused by the Intel® FPGA PAC N3000 Intel® MAX® 10 RoT. A correct signature is one created by a Code Signing Key (CSK) that is both signed by the root key and not yet canceled.

In cases where you have a pre-security production Intel® FPGA PAC, you must perform a one-time secure update. For more information, refer to Appendix B Section B.2: Upgrading from 1.1 Alpha-2 or Older to Production Version in the Intel Acceleration Stack User Guide: Intel® FPGA Programmable Acceleration Card N3000 .