WikiGlossarySecure Boot
Security

Secure Boot

Definition

Secure Boot is a device startup protection mechanism that helps ensure only trusted, approved software is allowed to run during the boot process. It is commonly implemented through firmware-based controls that verify digital signatures before loading bootloaders, operating system components, and other early-stage software. The goal is to reduce the risk that malware, rootkits, bootkits, or unauthorized system changes can compromise a device before normal security tools are active. In a governance, risk, and compliance context, Secure Boot is usually treated as part of endpoint hardening, system integrity, asset security, and configuration management. It supports a defensible control environment by helping organizations prove that laptops, servers, workstations, and specialized devices start from a known and trusted state. Secure Boot is most effective when paired with documented configuration baselines, change control, key management, endpoint monitoring, asset inventory, and exception handling for systems that cannot support it. It does not replace patching, access control, or endpoint detection, but it strengthens the foundation those controls depend on.

Real-World Examples

Endpoint hardening baseline

A startup defines a secure configuration baseline requiring company laptops to use Secure Boot before they can access internal systems.

Server integrity protection

A growing business enables Secure Boot on production servers to reduce the risk of unauthorized bootloaders or low-level malware running before the operating system starts.

Asset compliance review

An enterprise reviews its asset inventory and flags devices where Secure Boot is disabled, unsupported, or missing from configuration evidence.

Exception tracking

A manufacturing team documents exceptions for legacy workstations that cannot support Secure Boot and assigns compensating controls until replacement.

Secure Boot is a startup security feature that verifies whether early boot software is trusted before the operating system loads. It helps prevent unauthorized bootloaders, bootkits, and other low-level threats from running before normal security controls are active.

Secure Boot works by checking digital signatures during the boot process. Firmware verifies that each boot component is signed by a trusted authority or approved key before allowing it to run, helping preserve device integrity from the earliest startup stage.

Secure Boot is important because some attacks target the boot process before endpoint protection tools, logging, or user authentication are available. By enforcing trusted startup components, organizations reduce the risk of persistent malware and unauthorized system tampering.

Secure Boot is not universally required in every compliance program, but it is often relevant to security frameworks and compliance standards that expect secure configuration, endpoint hardening, system integrity, and risk-based technical controls. Organizations should evaluate whether it applies to their devices and risk profile.

Secure Boot compliance requirements typically include enabling the feature where supported, documenting configuration baselines, monitoring device status, reviewing exceptions, and retaining evidence that critical endpoints and servers use approved startup settings. Requirements should be mapped to the organization’s applicable standards and internal policies.

Secure Boot status can usually be checked through operating system settings, device management tools, UEFI firmware settings, endpoint inventory reports, or command-line utilities. For compliance purposes, organizations should prefer repeatable evidence from managed systems instead of relying only on manual screenshots.

Secure Boot is typically managed in UEFI firmware settings by selecting the Secure Boot option and ensuring the system uses compatible boot mode, trusted keys, and signed boot components. Changes should be tested carefully, especially on encrypted, dual-boot, or legacy systems.

Secure Boot verifies trusted software before and during the early boot process, while Trusted Boot usually refers to later operating system integrity checks after firmware has handed off control. Together, they help establish a chain of trust from device startup through operating system loading.

Secure Boot does not always require a TPM, because it relies primarily on firmware-based signature verification. However, TPM-based capabilities can complement Secure Boot by supporting measured boot, device health checks, disk encryption, and stronger evidence of system integrity.

Disabling Secure Boot can increase exposure to bootkits, rootkits, unauthorized bootloaders, and other attacks that modify the startup process. It can also weaken endpoint hardening evidence and make it harder to demonstrate that systems start from a trusted configuration.

VersionDateAuthorDescription
1.0.02026-05-07WatchDog GRC TeamInitial publication