Difference between revisions of "Trusted Computing"

From MgmtWiki
Jump to: navigation, search
(Trusted Mobility Solutions)
(Trusted Mobility Solutions)
Line 15: Line 15:
 
===Trusted Mobility Solutions===
 
===Trusted Mobility Solutions===
 
* [https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.
 
* [https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.
* Mobile Trusted Module (MTM) – [http://rtcgroup.com/arm/2007/presentations/193%20-%20Understanding%20Trusted%20Computing%20Group%20Standards%20for%20Mobile%20Phones%20and%20Trusted%20Storage%20Drives.pdf Understanding Trusted Computing Group Standards for Mobile Phones and Trusted Storage Drives]
+
* Mobile Trusted Module (MTM) – [http://rtcgroup.com/arm/2007/presentations/193%20-%20Understanding%20Trusted%20Computing%20Group%20Standards%20for%20Mobile%20Phones%20and%20Trusted%20Storage%20Drives.pdf Understanding Trusted Computing Group Standards for Mobile Phones and Trusted Storage Drives] printed in 2997, but never took off, still the thought was good
  
 
==References==
 
==References==

Revision as of 20:40, 10 July 2019

Full Title

Trusted Computing is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.

Context

There has been a recognized effort to create a separate execution environment that would be unaffected by malware running in the main computer. The first effort was started in 1995-02-21 in the Intel Data Security Operation where a 386 based co-processor was developed that could use the main data store by encryption and decryption of all data on the fly. This was widely realized with the TPM 1.0 hardware chips in the late 1990 and now with separate instruction sets on ARM and Intel processors.

Problems

  • Trusted computing is, by design, built to solve enterprise data security issues. The result is devices that can be wiped clean by the enterprise IT department. Not the sort of solution that would be acceptable to most users.

Solutions

Trusted Supply Chain

Before the Huawei troubles[1] the most common response to a question about supply chain corruption was met with comments like "you must be in real trouble if you don't know where your computers are coming from." It is still likely that most threat analysis will omit any concern with supply chain corruption. Even though it may be incredibly difficult to get management to consider supply chain issues, it is not useful to address any security issues if you cannot even be sure that the computers delivered are free of deliberate or accidental vulnerabilities.

Trusted Platform Module

Trusted Mobility Solutions

References

  1. Emily Stewart, The US government’s battle with Chinese telecom giant Huawei, explained Recode (2019-05-21) https://www.vox.com/technology/2018/12/11/18134440/huawei-executive-order-entity-list-china-trump