Главная
Study mode:
on
1
SECURITY
2
Using the TPM NVRAM to Protect Secure Boot Keys in OpenPOWER
3
Outline
4
OpenPOWER Secure Boot Team
5
Disclaimer
6
What is Secure Boot for?
7
POWER9 Boot Flow
8
Firmware Secure Boot is Upstream
9
Problem Statement
10
Protecting the OS Secure Boot Keys
11
OS Secure Boot Keys: Integrity
12
TPM2 NV Authorization
13
Atomic Secure Boot Variable Update
14
OS Secure Boot NV Indices
15
Firmware Secure Boot NV Index
16
Other TPM2 NV Commands
17
OS Secure Boot Architecture
18
Final Considerations
19
References
20
Questions?
Description:
Explore how the Trusted Platform Module (TPM) NVRAM is utilized to protect secure boot keys in POWER9 OpenPOWER systems in this 41-minute conference talk. Delve into the importance of securing authorized keys in non-volatile memory for platform OS verification. Learn about the design and implementation aspects of using TPM's shielded NVRAM to safeguard secure boot keys stored in PNOR. Discover the OpenPOWER firmware and Linux Kernel layers involved in this process. Gain insights into the POWER9 boot flow, firmware secure boot, and OS secure boot architecture. Understand TPM2 NV authorization, atomic secure boot variable updates, and various TPM2 NV commands. Presented by Claudio Siqueira de Carvalho, an experienced Linux security expert and OpenPOWER firmware developer from IBM's Linux Technology Center.

Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems

Linux Foundation
Add to list
0:00 / 0:00