The TNC architecture focuses on interoperability of network access control solutions and on the use of trusted computing as the basis for enhancing the security of those solutions. Integrity measurements are used as evidence of the security posture of the endpoint so access control solutions can evaluate the endpoint's suitability for being given access to the network.
TNC Arch... READ MORE
The PC Client Platform Specific Profile for TPM 2.0 systems defines the requirements for platform firmware to initialize and interact with a TPM 2.0 device in a PC Client platform. This specification should be used in conjunction with the TCG UEFI Protocol Specification Family 2.0, the TCG Physical Presence Interface Specification, and the TCG ACPI Specification to design and implement a PC Clie... READ MORE
This document contains the registry of TCG Algorithms.
The Algorithm Registry lists each algorithm assigned an identifier, allowing it to be unambiguously defined and referenced by other TCG specifications. This document is a compendium of data related to the various algorithms used in specifications created by the Trusted Computing Group (TCG). The compendium of algorithm data is intended to ens... READ MORE
The Trusted Computing Group TPM I2C Interface Specification is an industry specification that defines an I2C Interface for TPM 2.0.
As this specification defines only the interface for the I2C-TPM a suitable platform specification must be considered additionally to allow the design of a platform specific I2C-TPM. It is expected that the reader of this specification is familiar with the PTP .... READ MORE
The Trusted Network Communications (TNC) Work Group defines an open solution architecture that enables network operators to evaluate and enforce policies regarding endpoint integrity when granting access to a network infrastructure.
TNC IF-M Segmentation Specification Version 1.0, Revision 5
IF-M Segmentation Specifications FAQ... READ MORE
This document provides guidelines on integrating SDs implemented according to the Opal Family of specifications. This includes a description of the ownership model utilized in the TCG Storage specifications; the SID authority and its role in managing the storage device; and the processes and guidelines for taking ownership of the TPer. This document also provides insight on integration of other Op... READ MORE
TCG Draft Documents Currently in Public Review:
TCG Protection Profile PC Client Specific TPM 2.0 Version 1.1 Revision 0.12
Security Evaluation Work Group Specification
Review Period: September 12, 2017 – November 10, 2017 5:00pm Pacific
Implicit Identity Based Device Attestation
DICE Architectures Work Group Reference Document
Review Period: November 9, 2017 – Dece... READ MORE
The Trusted Network Connect (TNC) Work Group defines an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Software Identification tags (SWID tags) are XML documents that identify a specific software product.
TNC SWID Message and Attributes for IF-M Specification, Version 1.0,... READ MORE
This specification defines the Pyrite Security Subsystem Class (SSC). Any SD that claims Pyrite SSC compatibility SHALL conform to this specification. The intended audience for this specification is both trusted Storage Device manufacturers and developers that want to use these Storage Devices in their systems.
Storage Work Group Storage Security Subsystem Class: Pyrite, Version ... READ MORE
This specification defines the Opalite Security Subsystem Class (SSC). Any SD that claims Opalite SSC compatibility SHALL conform to this specification. The intended audience for this specification is both trusted Storage Device manufacturers and developers that want to use these Storage Devices in their systems.
TCG Storage Security Subsystem Class: Opalite Version 1.00 Revi... READ MORE