The Trusted Platform Module (TPM) Work Group has been chartered to create the TPM specification. The definition of the TPM architecture comes from the Technical Committee and the TPM Work Group defines the implementation of that architecture. A working knowledge of security in relation to the design and usage of cryptographic modules as well as cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols is recommended.
A new research report on “Trusted Computing” published by Aberdeen Group, a Harte-Hanks Company (NYSE:HHS), reveals that organizations that have deployed applications based on trusted computing infrastructure exhibit superior capabilities in security governance, risk management and compliance compared to other respondents. The term “trusted computing” refers to applications that leverage hardware-based “roots of trust” at the edge of the network and at the endpoints – sometimes referred to as “hardware anchors in a sea of untrusted software” – for higher assurance.
TPMs are a basic building block used in most other specifications, for providing an anchor of trust. They can be used for validating basic boot properties before allowing network access (TNC), or for storing platform measurements (PC Client), or for providing self-measurement to provide anchors of trust to hypervisors (Virtualization).
|Resource Name||Resource Type|
|TPM Library Specification 2.0||Specification|
|Errata for TPM Library Specification 2.0||Specification|
|PC Client Protection Profile for TPM 2.0||Specification|
|TCG PC Client Platform Physical Presence Interface Specification 1.2 and 2.0||Specification|
|TPM Main Specification||Specification|
|PC Client Protection Profile for TPM 1.2||Specification|
|TCG Algorithm Registry||Registry|
|Vendor ID Registry||Registry|
|Registry of Reserved TPM 2.0 Handles and Localities||Registry|
|TCG Specification Architecture Overview||Public Review|
|A Practical Guide to TPM 2.0||Book|
|Protect Your Data and Enhance Security||Infographic|
|BSSSD: Trusted Computing Now Available for FreeBSD and OpenBSD||Open Source|
|Trusted Platform Module (TPM) Summary||White Paper|
|Replacing Vulnerable Software with Secure Hardware||White Paper|
|Implementing Hardware Roots of Trust||White Paper|
|How to Use the TPM: A Guide to Hardware-Based Endpoint Security||White Paper|
|CESG IA Top Tips - Trusted Platform Modules||Other|
|Trusted Platform Module (TPM) 2.0: A Brief Overview||Other|