Implementing Hardware Roots of Trust: A New Guide to Hardware Security Developed by the SANS Institute Learn How to Implement a Ubiquitous Technology Already Embedded in Enterprise Endpoints
BETHESDA, Md., June 24, 2013 /PRNewswire-USNewswire/ -- SANS Institute has developed a first-of-its-kind guide to update organizations on exciting new uses for implementing hardware roots of trust, enabled by the Trusted Platform Module (TPM). The guide will be available at http://www.sans.org/info/133497.
In this seminal document SANS looks at the broad industry support for TPM, the standards behind it. The report also provides updates on how TPMs are widely used in many computing devices, from mobile phones to low-cost Chromebook computers to high-end servers. Operating system support, including Windows, is also reviewed with discussion of the TPM's security capabilities in Windows 8 and the upcoming Windows 8.1. The report also examines how self-encrypting drives, or SEDs can be used for additional enterprise security and data protection.
"In researching the progress TCG has made with the TPM, I was surprised to find just how much more widespread and mature these technologies are than even just two or three years ago," says Gal Shpantzer, security analyst and SANS instructor who authored the paper. "We're really seeing the diversity of platforms and use cases for the hardware root of trust that TCG has been promoting and coordinating for a full decade now."
This paper details how the TPM measures and verifies the state of a system to ensure it has not been tampered with or injected with malware. Among other things, readers will learn:
- How the standards-based TPM root of trust is gaining traction in formal security leadership in the government (through NIST SP 800-164 and NSA HAP, or High Assurance program and other programs, for example)
- Where and how TPM is embedded in hardware, as demonstrated in case studies from $250 Chromebooks with TPM for boot integrity on the consumer-grade devices to enterprise Windows 12 Servers
- Case studies on how TPM is implemented at pre-boot to protect against tampering and bootkits (formerly known as rootkits)
- Examples of TPM use for classified, multi-level desktop virtualization in the Air Force Research Labs (AFRL) SecureView program
"We're big believers in Trusted Computing Group and its mission as is evidenced by the strong dependencies that Windows has taken on TCG technologies such as UEFI [Unified Extensible Firmware Interface], TPM and SEDs," says Microsoft's Chris Hallum. "We'll continue to look for new way to improve Windows security by taking greater advantage the work and standards coming out of the TCG."
The paper is associated with an archived informational webcast featuring Gal Shpantzer and John Pescatore from the SANS Institute. Joining them are Cisco's Stacy Cannady, TPM expert, and Chris Hallum, Microsoft's product manager for Windows Security Solutions and expert on roots of trust.
To learn more about how TPM can best be implemented visit the recorded webcast at no charge and click the register button here: https://www.sans.org/webcasts/implementing-hardware-roots-trust-96507
About SANS Institute
The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted, and by far the largest source for world-class information security training and security certification in the world offering over 50 training courses. GIAC, an affiliate of the SANS Institute, is a certification body featuring over 20 hands-on, technical certifications in information security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; and it operates the Internet's early warning system - the Internet Storm Center. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community. (www.SANS.org)
The Trusted Computing Group (TCG) is a not-for-profit organization that develops, defines and promotes open, vendor-neutral, global industry standards based on a hardware root of trust, for interoperable trusted computing platforms. Billions of endpoints use TCG standards to ensure system integrity, protect networks and secure data. For more information, see www.trustedcomputinggroup.org and on Twitter and LinkedIn.
SOURCE SANS Institute