Hardware-Enabled Security

From MgmtWiki
Jump to: navigation, search

Full Title or Meme

Hardware-Enabled Security originated as a government category that includes a variety of implementations like TPM, Secure Enclave, Trusted Execution Environment and many others.

Context

NIST Interagency Report 8320D on Hardware-Enabled Security
Organizations employ a growing volume of machine identities, often numbering in the thousands or millions per organization. Machine identities, such as secret cryptographic keys, can be used to identify which policies need to be enforced for each machine. Centralized management of machine identities helps streamline policy implementation across devices, workloads, and environments. However, the lack of protection for sensitive data in use (e.g., machine identities in memory) puts it at risk. This report presents an effective approach for overcoming security challenges associated with creating, managing, and protecting machine identities throughout their lifecycle. It describes a proof-of-concept implementation, a prototype, that addresses those challenges by using hardware-based confidential computing. The report is intended to be a blueprint or template that the general security community can use to validate and utilize the described implementation.

Hybrid

Proposals in 2024 for a hybrid approach with a TPM (or SE) in the user's Smartphone and an HSM in the cloud are core to the EUDIW or eIDAS 2.0 proposals.

References