Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)
|
|
|
- Lee Powell
- 10 years ago
- Views:
Transcription
1 Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft) and Stacy Cannady (Cisco Systems)
2 Scope and Audience This webcast is primarily oriented toward CISOs and server/desktop/mobile security decision-makers. They need to respond to the higher end of the threat curve (both ongoing audit and intrusion), while addressing ongoing seismic shifts in IT. Trusted Platform Module (TPM) use cases include higher trust in confidentiality/integrity of handheld devices, desktop/server virtualization, cloud and consumerization of user devices. 2
3 Why is Hardware Root of Trust Needed? (1) A hardware root of trust can help with a variety of security issues, broadly divided into pre-boot and post-boot. In pre-boot, the TPM helps to secure the boot process against low-level malware and attest/measure integrity In post-boot, TPM can help with multiple use cases, such as root of trust for authentication and sensitive mobile apps like micropayments, as well as network layer security (Trusted Network Connect) 3
4 Why is Hardware Root of Trust Needed? (2) Malware can embed itself below the operating system (OS), where the software anti-malware packages run. This can be in the OS loader or in third-party boot drivers. One known example (in SANS view, the leading edge of such malware) is Mebromi, thought to be the first BIOS rootkit found in the wild, in 2011 ( 4
5 Do I Know You? Can I Trust You? Two basic requirements for transacting business: Do I know you? A computer receives a network connection What is the identity of the requesting computer? What proof is there that the claim of identity is genuine? Can I trust you? How can these two computers establish whether either of them is operating as designed or that a compromise has occurred? Identity alone is not enough for trust what if one computer has been compromised with spyware? What is the basis for a genuine claim of software integrity (or lack thereof)? If you know the answers, you know whether to transact business or not This is Alice Enterprise servers No HW-based identity to confirm it s Alice, so it isn t Alice. Identity Theft This is Alice, but my PC has spyware Enterprise servers HW-based identity check confirms it. The HW also states that Alice s computer is compromised.
6 The future is already here it s just not evenly distributed. William Gibson $250 Chromebook from Samsung, with TPM for boot integrity of Chrome OS Hardware root of trust for cloud? CloudHSM is an HSM by SafeNet, deployed in Amazon Web Services (AWS), to: securely generate, store, and manage the cryptographic keys used for data encryption such that they are accessible only by you. AWS CloudHSM FAQ 6
7 Chromebook Use of TPM Google s Chromebook A Self-Healing Computer Power on, measure BIOS with HW security Decide go/no-go, based on measurement match/mismatch If match, proceed to execute BIOS and boot If mismatch, perform rollback to last known good copy This is in a $250 consumer device available now. 7
8 Chromebook s Solution to Can I Trust You? Chromebook uses TPM to find and correct corruption in firmware 1. TPM and Core Root of Trust for Measurement (CRTM) measure BIOS at boot 2. Measurements are internally verified 3. If a mismatch is found, the offending module is rolled back to the Last Known Good 4. Then boot continues 3. Measurements match expectations 1. Power on 2. CRTM measures BIOS 4. Execute BIOS and boot 3. Mismatch found 3.5 Rollback bad module to last known good copy
9 PWC s Solution to Do I Know You? Requirement: Security hardware to protect a X.509 certificate for VPN log on Solution must be inexpensive and hassle-free What PWC did: TPM-aware CSP installed under MS-CAPI in PWC PCs PWC identity certs imported into MS-CAPI, under the TPM-aware CSP (TPM protects the cert) User-entered PIN authorizes TPM to release cert for login to PWC networks
10 PWC and TPM for VPN authentication Chose the TPM route because it s an open standard with multiple vendor support TPM was already in 95% of PwC laptops Considered USB tokens and smartcards, passed on those due to cost of ownership (lost/stolen), not standards-based, didn t want additional device, etc. Already had software PKI in place but wanted hardware-based storage, due to threat of stolen keys Deployed 35,000 endpoints in 2010 (first public mention) 10
11 PwC and TPM for VPN authentication Gautam Muralidharan from PwC, about the TPM deployment, at a 2011 NSA conference the best kept secret in information security. It is a well defined Open Standard and has low costs to deploy The only universal security device in different brands of PCs that worked for us. 11
12 CloudHSM in AWS (SafeNet) EAL4+ HSM in a VPC on AWS Hardware root of trust for cryptographic operations Tamper-resistant, secure key management, reduces latency compared to off-cloud HSM Increases security compared with softwarebased key management $5,000 per device, plus usage fees 12
13 Taking Advantage of Ubiquity Hardware self-encrypting drives (SEDs) for notebooks/servers Hardware Trusted Platform Module (TPM) in tablets/notebooks/servers Virtual TPMs in phones/tablets HSMs in cloud You probably already own a lot of hardware with a TPM in it. If not, look at specifying TPMs in upgrade cycles and planning for use cases that include TPM. 13
14 Standards-Based, Vendor- and Community-Supported TCG is an open standards organization, supported by hardware and software vendors including: AMD, ARM, Intel & NVIDIA (CPU & GPU) Gemalto, Infineon Technologies & Phoenix (BIOS & security hardware) NetApp, Oracle, Seagate & Western Digital (Storage) Dell, HP, IBM, Lenovo & Sony (Notebooks/Servers) Nokia, Panasonic & Samsung (Mobile) Juniper & Cisco (Network) Microsoft & Red Hat (OS, major closed/open source) Absolute, McAfee, Wave Systems, WinMagic, Credant, Cryptomill, Softex (Management) 14
15 Standards-Based, Vendor and Community Supported TPM specification version 1.2 is published as ISO/IEC Parts 1-4. The concept of the hardware root of trust is supported by the National Security Agency (NSA) High Assurance Platform (HAP). NSA s HAP is based on Embedded Security Module (ESM). At boot time and at runtime, a HAP device measures software in a trusted manner before that software is allowed to execute. Source: 15
16 Standards-based, Vendor and Community Supported The National Institute of Standards and Technology (NIST) has issued several special publications on trust, including firmware/bios security and hardware root of trust (SP , 155 and 164). From SP-164: Hardware RoTs are preferred over software RoTs due to their immutability, smaller attack surfaces and more reliable behavior. They can provide a higher degree of assurance that they can be relied upon to perform their trusted function or functions. 16
17 NIST on Hardware Roots of Trust for Mobile Security NIST enumerates hardware roots of trust (or trusted software, perhaps virtual TPM) for: Storage of cryptographic keys and critical security parameters - to verify digital signatures associated with software/firmware and create assertions based on the result -Integrity through the use and maintenance of tamper evident locations for the purpose of securely storing measurements and assertions such as the TPM method for extending Platform Configuration Registers, PCRs) 17
18 NIST on Hardware Roots of Trust for Mobile Security (Continued) NIST enumerates hardware (or trusted software ) roots of trust for: -Reporting to manage identities and sign assertions for the purposes of generating device integrity reports. It has the capability to reliably cryptographically bind an entity to the information it provides Relies on Measurement and Integrity. -Measurement has the capability to make inherently reliable integrity measurements and is the root of the chain of transitive trust for subsequent measurement agents. <-- Integrity and Reporting roots of trust use the Measurement facility 18
19 NIST on Hardware Roots of Trust for Mobile Security (Continued) The key point is that mobile devices need to implement the security capabilities and services defined above in trustworthy hardware, firmware and software components. Note that the TPM concept can be implemented in any of those ways. Today we have dedicated hard TPM chips, but also virtual TPMs inside processors. NIST SP
20 Virtualization (Server) Intel Trusted Execution Technology (TXT) uses hardware binding for VMs spinning up. Requires a TPM. Example use case: Geofencing for regulatory compliance. VMs can t spin up unless run on specific hardware, which is easier to locate than a VM. 20
21 Intel TXT 2012 The SANS Institute
22 Virtualization (SecureView Desktop) SecureView is an Air Force Research Lab (AFRL) project with industry, to create secure multi-level workstations (Unclassified up to TS on same machine). TPM is included as part of the unlock mechanism for multiple encrypted virtual machines (VMs), each at its own level. 22
23 Virtualization (SecureView Desktop) Measured Launch for XenClient Verify Xen Client installation integrity, prevent offline tampering of installation or configuration state Measured Launch Intel TXT used to establish DRTM, measure Xen Client primary components on every boot Extend measurements to include secondary components Trusted Platform Module PCRs reflect the state and configuration of system All XenClient device configuration state is encrypted Encryption key is sealed by the TPM, only released if PCR values match those expected Slide 25 23
24 Virtualization (SecureView Desktop) XenClient XT: Trusted Execution Technology Slide 26 24
25 Virtualization (SecureView Desktop) XenClient XT Architecture Slide 22 25
26 Microsoft s View of TCG and TPM TCG mission is critical for industry Group member and board participant Windows is taking deep dependencies on TCG technologies Using UEFI for root of trust Using TPM for securing data, integrity validation, increased entropy Supporting enhanced SED s for drive data protection We will continue to find new and interesting ways to use UEFI and TPM in future products 2012 The SANS Institute
27 History of UEFI and TPM IN Windows Windows Vista/7 Windows 8 Windows 8.1 BitLocker Trusted Boot ASLR Bitlocker Measured Boot Virtual Smart Cards Certificate Storage Visual Studio Trusted Boot ASLR Bitlocker Measured Boot Virtual Smart Cards Certificate Storage Visual Studio TPM Key Attestation Provable PC Health 2012 The SANS Institute
28 TPM Use in Windows Key Features Trusted Boot Leverages UEFI as the Windows root of trust UEFI Secure Boot ensures malware is unable to start before the OS BitLocker Protects data at rest with full volume encryption Uses TPM to protect keys that are used to unlock protected drives Virtual Smartcards Provides 2FA with a virtualized Smart Card solution Uses TPM to protect users digital identity (certificate) 2012 The SANS Institute
29 TPM Use in Windows Key Features TPM Based KSP Data within the Windows Key Storage Provider is protected with HW Uses TPM to encrypted/decrypt keys; prevents export and replay TPM Key Attestation (new in Windows 8.1) Enables resources to implement access control policy that can request confirmation that certificate and keys being used by a client have been securely provisioned, stored, and maintained Uses TPM related metadata for access control policy Measured Boot Measurements of firmware and critical Windows boot files are taken Uses TPM to securely measure and persist Measured Boot data Provable PC Health (new in Windows 8.1) A free cloud based service that assembles system integrity and security related configuration and sends it to the cloud for remote analysis Uses TPM derived Measured Boot data for health analysis 2012 The SANS Institute
30 What Will Be Available in the Near Future? Virtual TPM (for example the TrustZone available on ARM devices and Atom on Intel Atom devices) Haswell (new architecture from Intel) Mobile devices with TPMs allow Google to incorporate TPM use in its Five-year Identity Plan (May 2013) 30
31 Conclusion TPM has more than a decade of R&D invested Participation by some of the IT industry s biggest players, from handheld to server Use cases include increased trust in the integrity of firmware/software stack and confidentiality of data Bare metal and virtual, client and server-side, including HSMs in the cloud and multilevel classified machines Hardware roots of trust are becoming ubiquitously available and cheap TPM is embedding hardware-enabled security from cheap consumer devices all the way to enterprise-grade datacenter infrastructure. 31
32 References TCG members: Mebromi paper from GMU.edu Google Five Year Identity Plan NSA s High Assurance Platform (HAP) NIST Special Publications SP 147, 155, 164 Windows TPM Provider - Windows TPM 2.0 Hardware Interface Table - B57B-DFAA9723B6D5/tpm-2.0-hardware-interface-table.docx Windows Virtual SmartCards C1-411EA0DBFF42/Understanding%20and%20Evaluating%20Virtual%20Smart %20Cards.docx Intel TXT graphic ARM TrustZone virtual TPM 32
33 References SecureView Multi-Level Desktop with TPM: nte.pdf (See slides 22, 25-26) Google Chromebook and TPM: AWS/SafeNet CloudHSM: PwC TPM Authentication Case Study: idharan.pdf NIST SP : NSA High Assurance Platform (HAP): 33
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
Using the TPM to Solve Today s Most Urgent Cybersecurity Problems
Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, 2014 10:00AM PDT 2 Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Case Study: Leveraging TPM for Authentication and Key Security
Case Study: Leveraging TPM for Authentication and Key Security 09/20/2011 Gautam Muralidharan Manager, Advisory Services PwC Speaker Introduction Gautam is a manager in the Advisory Technology practice
CS 155 Spring 2010. TCG: Trusted Computing Architecture
CS 155 Spring 2010 TCG: Trusted Computing Architecture Background! TCG consortium. Founded in 1999 as TCPA. Main players (promotors):! Goals: AMD, HP, IBM, Infineon, Intel, Lenovo, Microsoft, Sun (>200
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Commercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure
Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone
CS 155 Spring 2006 Background TCG: Trusted Computing Group Dan Boneh TCG consortium. Founded in 1999 as TCPA. Main players (promotors): (>200 members) AMD, HP, IBM, Infineon, Intel, Lenovo, Microsoft,
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
White Paper SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications SecureView provides accredited cross-domain
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB
SecureView & XenClient XT Security Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB AFMC PA Case Number: AFMC-2011-0166 The material was assigned a clearance of CLEARED on 01 Sep
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
WIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
Trusted Computing Basics: Self-Encrypting Drives
09/21/2011 Trusted Computing Basics: Self-Encrypting Drives Ryan C. Getek, Ph.D. CISSP-ISSEP Secure Storage Lead, Trusted Computing Division, NCSC Jason Cox Client Security Products Lead, Seagate Technology
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology
Dell Client Systems Take Control of Your Environment Powered by Intel Core 2 processor with vpro technology Simplifying IT As IT infrastructures grow, heterogeneous environments expand. Growing infrastructures
Security Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Deeper Levels of Security with Intel Identity Protection Technology
WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
The True Story of Data-At-Rest Encryption & the Cloud
The True Story of Data-At-Rest Encryption & the Cloud by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800 500 3167 twitter.com/firehost
The New Key Management:
SESSION ID: SEC-F01 The New Key Management: Unlocking the Safeguards of Keeping Keys Private Jono Bergquist Solutions Engineering Lead - APJ CloudFlare Outline Why application-level TLS is important Key
SAFEAPP TECHNOLOGY PROGRAM
SAFEAPP TECHNOLOGY PROGRAM Join our dynamic community of technology application developers that recognize the advantages of SafeNet security solutions. SafeNet Overview................. 3 Partnering with
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Dell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
Acronym Term Description
This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. Acronym Term Description
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
FDE Performance Comparison. Hardware Versus Software Full Drive Encryption
FDE Performance Comparison Hardware Versus Full Drive Encryption A look at performance and other differences between hardware based self-encrypting drives and software approaches to full disk encryption
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments Daniel Boteanu Kevvie Fowler November 12 th, 2015 Who are we? Daniel Boteanu Forensic Technology and ediscovery, KPMG Canada M.Eng., M.Sc.
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
