Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Secure Boot

What is Secure Boot?

Understanding Secure Boot

Secure Boot establishes a chain of trust in the system startup process, ensuring that only authorized and unmodified software runs during boot—a critical period before traditional security controls activate. This technology verifies the cryptographic signatures of each component in the boot sequence: firmware, bootloader, and operating system kernel. The process begins with hardware-based root of trust (typically embedded in the system’s firmware or dedicated security chips) that contains initial verification keys, then extends through each stage, creating an unbroken chain of signature validation. If any component fails verification—perhaps due to malware modification or unauthorized replacement—the boot process halts, preventing the compromise from spreading further. While primarily designed to prevent persistent malware that subverts the operating system, Secure Boot also protects against physical attacks where someone might attempt to boot unauthorized operating systems to access protected data. Implementation challenges include managing legitimate dual-boot configurations, handling firmware and operating system updates that change verified components, and balancing security with operational flexibility, particularly in enterprise environments where custom boot configurations might be necessary.

Learn More About Secure Boot: