Difference between revisions of "Trusted Computing"

From MgmtWiki
Jump to: navigation, search
(Trusted Mobility Solutions)
(References)
 
(17 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
==Problems==
 
==Problems==
 
* Trusted computing is, by design, built to solve enterprise data security issues. The result is devices that can be wiped clean by the enterprise IT department. Not the sort of solution that would be acceptable to most users.
 
* Trusted computing is, by design, built to solve enterprise data security issues. The result is devices that can be wiped clean by the enterprise IT department. Not the sort of solution that would be acceptable to most users.
 +
* Trusted Computing is just a hardware assist for security. It requires an easy to use [[API]] to make that accessible to programmers, and, through them, to users. See the page on the wiki [[Trusted Execution Environment]] for the [[API]]s.
  
 
==Solutions==
 
==Solutions==
 
===Trusted Supply Chain===
 
===Trusted Supply Chain===
Before the Huawei troubles<ref>Emily Stewart, ''The US government’s battle with Chinese telecom giant Huawei, explained'' Recode (2019-05-21) https://www.vox.com/technology/2018/12/11/18134440/huawei-executive-order-entity-list-china-trump</ref> the most common response to a question about supply chain corruption was met with comments like "you must be in real trouble if you don't know where your computers are coming from." It is still likely that most threat analysis will omit any concern with supply chain corruption. Even though it may be incredibly difficult to get management to consider supply chain issues, it is not useful to address any security issues if you cannot even be sure that the computers delivered are free of deliberate or accidental vulnerabilities.
+
Before the Huawei troubles<ref>Emily Stewart, ''The US government’s battle with Chinese telecom giant Huawei, explained'' Recode (2019-05-21) https://www.vox.com/technology/2018/12/11/18134440/huawei-executive-order-entity-list-china-trump</ref> the most common response to a question about [[Supply Chain]] corruption was met with comments like "you must be in real trouble if you don't know where your computers are coming from." It is still likely that most threat analysis will omit any concern with supply chain corruption. Even though it may be incredibly difficult to get management to consider supply chain issues, it is not useful to address any security issues if you cannot even be sure that the computers delivered are free of deliberate or accidental vulnerabilities.
 +
 
 +
On 2018-10-08 Business week reported<ref>Jordan Robertson + 1, ''The Big Hack'' Business week 2018-10-08 p. 52ff</ref> that a major supplier of computer hardware manufactured in China had been hacked at the site of a subcontractor. This hardware wound up in machines at the DoD and many other sites. Naturally many of the targets of the attack have denied any impact to their business, as would be expected (see wiki page [[Conduct Risk]]). In this case it has been alleged that the Chinese military infiltrated the manufacturing process with the expectation that the devices would be installed in sensitive sites and then "phone home" for attack software.
  
 
===Trusted Platform Module===
 
===Trusted Platform Module===
 
*[https://trustedcomputinggroup.org/ Trusted Computing Group] announced that its [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TPM 2.0 (Trusted Platform Module)] Library Specification was approved as a formal international standard under ISO/IEC ISO/IEC 11889:2015 (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment. A good suppary can be found in the [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TCG TSS 2.0 Overview and Common Structures Specification].
 
*[https://trustedcomputinggroup.org/ Trusted Computing Group] announced that its [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TPM 2.0 (Trusted Platform Module)] Library Specification was approved as a formal international standard under ISO/IEC ISO/IEC 11889:2015 (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment. A good suppary can be found in the [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TCG TSS 2.0 Overview and Common Structures Specification].
 +
 +
===Other Trusted Platforms===
 +
* [https://globalplatform.org/latest-news-overview/ Global Platform Latest News]
 +
 
===Trusted Mobility Solutions===
 
===Trusted Mobility Solutions===
[https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.
+
* [https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.
 +
* Mobile Trusted Module (MTM) – [http://rtcgroup.com/arm/2007/presentations/193%20-%20Understanding%20Trusted%20Computing%20Group%20Standards%20for%20Mobile%20Phones%20and%20Trusted%20Storage%20Drives.pdf Understanding Trusted Computing Group Standards for Mobile Phones and Trusted Storage Drives] printed in 2007, but never took off, still the thought was good.
 +
 
 +
===Trust on Windows Platforms===
 +
* Trustworthy computing become a common goal for computers commercially available to users with the Windows XPSP2 update that began in 2002.
 +
* [https://cloudntech.blogspot.com/2019/07/secure-workstation-root-of-trust-to.html Secure Workstation] creates roots of trust.
 +
 
 +
===Trust on Android Platforms===
 +
* [https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html Google Project Zero]
 +
* [https://www.android.com/security-center/  Hardware designed to defend] "At the deepest level, we leverage the hardware itself to protect access to the device. This includes a secure lock screen, Verified Boot to make sure the device hasn’t been tampered with, plus hardware-assisted encryption and key handling to help keep data safe, both in transit and at rest. Our newest OS, Android 9 Pie, also supports certified, tamper-resistant hardware."
 +
* [https://source.android.com/security/trusty Trusty is a secure Operating System (OS)] that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software.
  
* [http://rtcgroup.com/arm/2007/presentations/193%20-%20Understanding%20Trusted%20Computing%20Group%20Standards%20for%20Mobile%20Phones%20and%20Trusted%20Storage%20Drives.pdf Understanding Trusted Computing Group Standards for Mobile Phones and Trusted Storage Drives]
+
===Trust on Apple iPhone Platforms===
  
 
==References==
 
==References==
  
 
[[Category:Glossary]]
 
[[Category:Glossary]]
 +
[[Category:Security]]
 
[[Category:Trust]]
 
[[Category:Trust]]

Latest revision as of 12:51, 17 February 2021

Full Title

Trusted Computing is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.

Context

There has been a recognized effort to create a separate execution environment that would be unaffected by malware running in the main computer. The first effort was started in 1995-02-21 in the Intel Data Security Operation where a 386 based co-processor was developed that could use the main data store by encryption and decryption of all data on the fly. This was widely realized with the TPM 1.0 hardware chips in the late 1990 and now with separate instruction sets on ARM and Intel processors.

Problems

  • Trusted computing is, by design, built to solve enterprise data security issues. The result is devices that can be wiped clean by the enterprise IT department. Not the sort of solution that would be acceptable to most users.
  • Trusted Computing is just a hardware assist for security. It requires an easy to use API to make that accessible to programmers, and, through them, to users. See the page on the wiki Trusted Execution Environment for the APIs.

Solutions

Trusted Supply Chain

Before the Huawei troubles[1] the most common response to a question about Supply Chain corruption was met with comments like "you must be in real trouble if you don't know where your computers are coming from." It is still likely that most threat analysis will omit any concern with supply chain corruption. Even though it may be incredibly difficult to get management to consider supply chain issues, it is not useful to address any security issues if you cannot even be sure that the computers delivered are free of deliberate or accidental vulnerabilities.

On 2018-10-08 Business week reported[2] that a major supplier of computer hardware manufactured in China had been hacked at the site of a subcontractor. This hardware wound up in machines at the DoD and many other sites. Naturally many of the targets of the attack have denied any impact to their business, as would be expected (see wiki page Conduct Risk). In this case it has been alleged that the Chinese military infiltrated the manufacturing process with the expectation that the devices would be installed in sensitive sites and then "phone home" for attack software.

Trusted Platform Module

Other Trusted Platforms

Trusted Mobility Solutions

Trust on Windows Platforms

  • Trustworthy computing become a common goal for computers commercially available to users with the Windows XPSP2 update that began in 2002.
  • Secure Workstation creates roots of trust.

Trust on Android Platforms

  • Google Project Zero
  • Hardware designed to defend "At the deepest level, we leverage the hardware itself to protect access to the device. This includes a secure lock screen, Verified Boot to make sure the device hasn’t been tampered with, plus hardware-assisted encryption and key handling to help keep data safe, both in transit and at rest. Our newest OS, Android 9 Pie, also supports certified, tamper-resistant hardware."
  • Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software.

Trust on Apple iPhone Platforms

References

  1. Emily Stewart, The US government’s battle with Chinese telecom giant Huawei, explained Recode (2019-05-21) https://www.vox.com/technology/2018/12/11/18134440/huawei-executive-order-entity-list-china-trump
  2. Jordan Robertson + 1, The Big Hack Business week 2018-10-08 p. 52ff