Table of Contents
What Is Secure Boot?
Secure Boot is a security feature built into modern computer firmware that ensures only trusted, digitally signed software can run during the startup process. It acts as a chain of trust, verifying each piece of software loaded during boot — from the firmware itself through the bootloader to the operating system kernel — before allowing it to execute.
Without Secure Boot, an attacker who gains access to your system can install a bootkit or rootkit — malicious software that loads before your operating system and antivirus. Because these threats operate below the operating system, they are invisible to traditional security software and can survive operating system reinstalls and even hard drive replacements if they infect the firmware.
Secure Boot prevents this by checking the digital signature of every component in the boot chain. If any component has been tampered with or is not signed by a trusted authority, the system refuses to boot, alerting you to the problem.
UEFI vs. Legacy BIOS
To understand Secure Boot, you need to understand the transition from BIOS to UEFI.
BIOS (Basic Input/Output System) is the original firmware interface developed in the 1980s. BIOS has no concept of signature verification — it simply loads and executes whatever code it finds in the master boot record (MBR) of the boot drive. This made it trivially easy for malware to inject itself into the boot process.
UEFI (Unified Extensible Firmware Interface) is the modern replacement for BIOS. UEFI provides a more capable firmware environment with support for larger drives, faster boot times, graphical interfaces, and critically, Secure Boot. UEFI stores boot files in an EFI System Partition using the GPT partitioning scheme.
Secure Boot is a UEFI feature and is not available on systems running legacy BIOS. Most computers manufactured after 2012 ship with UEFI firmware and Secure Boot enabled by default.
How Signature Verification Works During Boot
The Secure Boot verification process follows a chain of trust rooted in keys stored in the firmware.
The Key Database
UEFI firmware contains several key databases that control Secure Boot behavior:
- Platform Key (PK): The master key, typically set by the hardware manufacturer. It controls who can modify the other key databases.
- Key Exchange Keys (KEK): Keys authorized to update the signature databases. Microsoft and the hardware manufacturer typically hold KEKs.
- Signature Database (db): Contains certificates and hashes of trusted bootloaders and drivers. Software signed by these keys is allowed to run.
- Forbidden Signature Database (dbx): Contains certificates and hashes of known-malicious or revoked software. Anything matching this list is blocked.
The Verification Process
When you power on your computer, the UEFI firmware performs these steps:
- The firmware initializes hardware and verifies its own integrity.
- The firmware locates the bootloader on the EFI System Partition.
- Before executing the bootloader, firmware checks its digital signature against the Signature Database (db) and the Forbidden Database (dbx).
- If the signature is valid and trusted, the bootloader executes. If not, boot is halted.
- The bootloader then verifies the operating system kernel's signature before loading it.
- The kernel verifies drivers and modules as they load.
Each stage verifies the next, creating an unbroken chain of trust from firmware to operating system.
TPM and Secure Boot
The Trusted Platform Module (TPM) is a dedicated security chip that complements Secure Boot. While Secure Boot verifies that software is signed by a trusted authority, the TPM provides additional capabilities.
Measured Boot uses the TPM to record (measure) each component loaded during startup. These measurements are stored in the TPM's Platform Configuration Registers (PCRs). If any measurement differs from expected values, it indicates that the boot chain has been modified.
BitLocker integration on Windows uses TPM measurements to seal the disk encryption key. If the boot chain is tampered with, the TPM refuses to release the encryption key, and the system cannot access the encrypted drive. This prevents an attacker from modifying the bootloader to bypass the operating system's login screen.
Remote attestation allows a TPM to prove to a remote server that the system booted with a trusted software configuration. This is used in enterprise environments to verify that endpoint devices have not been compromised.
Enabling and Managing Secure Boot
Secure Boot is configured through your computer's UEFI firmware settings (often called "BIOS setup" despite technically being UEFI). Access this by pressing a key during startup — commonly F2, F12, Delete, or Escape, depending on the manufacturer.
In the firmware settings, look for a Security or Boot section containing Secure Boot options. You can typically enable or disable Secure Boot, clear the key databases, or restore factory keys.
To check whether Secure Boot is enabled on Windows, open System Information (msinfo32) and look for "Secure Boot State." On Linux, run mokutil --sb-state in a terminal.
Common Issues and Dual-Booting Linux
Secure Boot can create friction for users who install alternative operating systems, particularly Linux distributions.
Since Microsoft controls the keys that most UEFI firmware trusts by default, Linux distributions need a way to boot on Secure Boot-enabled systems. Most major distributions (Ubuntu, Fedora, openSUSE, Debian) solve this by using a Microsoft-signed "shim" bootloader. The shim is signed by Microsoft's UEFI certificate, and it then verifies the distribution's own bootloader using the distribution's key.
If you encounter Secure Boot issues while dual-booting, you have several options: use a distribution that supports Secure Boot through the shim mechanism, enroll the distribution's key using Machine Owner Key (MOK) management, or disable Secure Boot in firmware settings (which reduces your boot security).
Windows 11 and Secure Boot Requirements
Windows 11 requires both Secure Boot capability and a TPM 2.0 module. These requirements were controversial because they excluded many older but still functional computers. Microsoft's rationale was that these features provide a baseline security foundation that Windows 11's security architecture depends on, including virtualization-based security (VBS) and credential protection.
Secure Boot is a foundational defense that protects the most critical phase of your computer's operation — the moments between pressing the power button and reaching your login screen. When combined with TPM, disk encryption, and a regularly updated operating system, it establishes a strong security baseline that makes firmware-level attacks significantly more difficult for adversaries.
Share this article

Raimundo Coelho
Cybersecurity specialist and technology professor with over 20 years of experience in IT. Graduated from Universidade Estácio de Sá. Writing practical guides to help you protect your data and stay safe in the digital world.