Главная
Study mode:
on
1
Intro
2
Joy Latten
3
Q&A During the Presentation
4
The Trusted Platform Module (TPM)
5
UEFI Secure Boot and the TPM
6
TPM PCR 7 Isn't Always Stable
7
TPM Extended Authorizations (EA)
8
Our Problem
9
Our Solution: The Basics
10
The Boot Process: UEFI Firmware Boot
11
The Boot Process: Bootloader
12
The Boot Process: Kernel and OS
13
Managing the TPM
14
TPM EA Policy Revocation
15
Development Systems
16
The Implementation
17
Stubby
18
TPM Provisioning Requirements
19
What's Needed?
20
Now what?
21
More Information
Description:
Explore the intricacies of securing Trusted Platform Module (TPM) secrets in datacenter environments through this informative conference talk presented by Paul Moore from Microsoft and Joy Latten from Cisco. Delve into the fundamentals of TPM, UEFI Secure Boot, and their interplay in modern computing systems. Understand the challenges associated with TPM PCR 7 stability and learn about TPM Extended Authorizations (EA). Discover a comprehensive solution to address security concerns, covering the entire boot process from UEFI firmware to the operating system. Gain insights into TPM management, policy revocation, and development system considerations. Examine the implementation details, including the role of Stubby and TPM provisioning requirements. Conclude with a discussion on future steps and resources for further exploration of TPM security in datacenter environments.

Securing TPM Secrets in the Datacenter

Linux Foundation
Add to list