PrisonPC Requirements
The following requirements cover both hardware and firmware. PrisonPC supports both Legacy BIOS and UEFI firmware, allowing deployment on older or recycled hardware that may not include full UEFI support. UEFI with Secure Boot is strongly preferred for new hardware purchases, however the firmware requirements below apply to whichever firmware mode the device supports. For UEFI devices, the intent is to ensure the PILS desktop will boot operating systems signed exclusively by PrisonPC (not by Microsoft or similar), and that an attacker or end-user with physical access cannot undermine this (e.g. by disabling Secure Boot or triggering a factory reset of the UEFI settings).
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119.
- SHOULD include Intel NIC and Intel GPU, as these are most compatible with PrisonPC.
- MUST include GigE speed NIC.
- NIC MUST support PXE (netboot)
- NIC SHOULD support WOL (Wake-on-LAN).
- CPU MUST be x86-64 (i.e., not ARM), and MAY be low-end/low-speed.
- MUST include 8G+ RAM.
- UEFI SHOULD be used for new hardware purchases
- CSM (“legacy BIOS mode”) MUST be removed/disabled.
- Secure Boot MUST be enabled.
- The only secure boot “PK” key SHOULD be the certificate provided by PrisonPC.
- The only secure boot “KEK” key MUST be the certificate provided by PrisonPC.
- The only secure boot “db” key MUST be the certificate provided by PrisonPC.
- The secure boot “KEK” and “db” keyrings MUST NOT include any of these certificates:
- The secure boot “dbx” keyring MUST NOT include the certificate provided by PrisonPC.
- The secure boot “dbx” keyring MAY include some/all of these certificates:
- The UEFI config (e.g. “hit F2/Del during boot”) MUST NOT allow the end user to change or bypass any of the above-mentioned settings in any way.
- Triggering a factory reset condition MUST NOT allow the end user to change or bypass any of the above-mentioned settings in any way, e.g. by opening the case and shorting a jumper, or by toggling the power switch in quick succession thus triggering a hardware reset.
- Network boot MUST be possible (e.g. DHCPv4 + TFTP, or DHCPv4 + HTTP).
- Legacy BIOS MAY be used where budget or hardware constraints apply
- Firmware configuration screens MUST be disabled. It is acceptable for the firmware to display read-only information such as date, time, and MAC address, but users MUST NOT be able to edit any firmware values.
- Firmware password protection MUST be disabled. Note that common password protection is insufficient to satisfy the previous requirement.
- The device MUST boot from PXE (netboot) only.
- Boot from internal storage (HDD, SSD, etc) and removable media (USB, CD/DVD, etc) MUST be disabled under all circumstances.
- WoL (Wake-on-LAN) SHOULD be enabled.
- Any firmware factory default, optimised default, or similar reset condition MUST conform to these requirements, to ensure users cannot reset to insecure settings.
- Firmware MUST NOT permit updates to be applied via removable media. Firmware updates MAY be applied by PrisonPC over the network via PXE (netboot).
Correctional Facility Requirements
We have observed, across many correctional facility deployments, that procuring facilities commonly specify requirements beyond those mandated by PrisonPC itself. These are not requirements of the PrisonPC platform; a device meeting only the PrisonPC requirements above will function correctly. They are included here because vendors who anticipate these preferences will be better positioned to meet tender requirements.
- 55cm (21") or larger display.
- All-in-One chassis.
- USB ports, for HID devices (e.g. keyboard and mouse).
- Glass fascia. Vendors are encouraged to consider the option of stronger tempered glass as some correctional facilities consider this a valuable feature.
- Internal PSU. An external PSU is not suitable as it can be used as a flail weapon.
- No webcam. Exceptions may be made for desktops isolated in monitored rooms, such as for virtual hearings or similar.
- No internal storage (HDD, SSD, etc).
- No wireless communications devices (TV receiver, WiFi, Bluetooth, InfraRed, cellular modem, etc).
- No microphone.
- No accessible mass storage slots (e.g. SD-Card reader), excepting the mandatory USB ports for HID devices. It is sufficient to leave any such device disconnected from the controller.
- Chassis secured with Tamper-Resistant Torx (also known as Torx TR) or pin-in Torx to ensure inmates cannot gain access to the internal components.
- Internal speakers.
- 3.5mm TRS stereo jack and TS mic, or combined TRRS audio jack.
- Optical (CD/DVD) drive. Some correctional facilities require optical drives while the policy in others is that the drive be removed and a blanking plate securely installed in its place.
- Transparent chassis, with suitable electromagnetic shielding. High-security facilities may appreciate the option of a transparent chassis.
- Touchscreen interface.