3/11/2023 0 Comments Trusted platform module 1.2 driver![]() The TPM's key generation and certification and its system state capture interact heavily Here’s a high-level summary of a TPM’s main features:įigure 1. In addition, any private keys that you create on the TPM cannot be exported unless you explicitly configure them as such. The TPM’s root keys and the keys that it generates can’t leave the TPM, thus gaining protection from compromised operating systems or highly privileged project admins. “Okay…,” we hear you asking, “what’s a TPM device and why should I care?” We’re glad you asked! What’s a Trusted Platform Module, or TPM?Ī TPM is a hardware, firmware, or virtual device that aids in securing machines in several ways: it can generate keys, use them for cryptographic operations (e.g., for symmetric and asymmetric key generation, signing, and decryption), and certify them based on its root Endorsement Key (which is in turn certified by the Google Public Root Certificate Authority). As part of the launch, we used Shielded VM to create several of our curated Google Compute Engine instances and attached a virtual Trusted Platform Module 2.0 (TPM) device to them. Today, we shared details of Shielded VMs, a suite of security tools and techniques that demonstrate that a VM hasn’t been compromised.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |