Search Resources

Clear Search


   

TCG Guidance for Securing Network Equipment

The TCG Guidance for Securing Network Equipment provides recommendations and detailed advice on how TCG standards should be used to secure network equipment such as routers, switches, and firewalls. Physical network functions are considered in this document; virtualized network functions are not considered in this version. While the TPM’s resistance to physical attack can help protect device ... READ MORE

Trust Assessment Framework

As enterprises and individuals move into more complex hybrid environments with services spread across mobile apps, cloud service providers and distributed ecosystems it is imperative that we find a way to manage the trust relationships that make the distribution of responsibility work. This is more than just validation of the identity of an end user or even the state of a single device. Enterprise... READ MORE

TCG TPM v2.0 Provisioning Guidance

This document outlines a process for provisioning and de-provisioning Trusted Platform Modules (TPMs) v2.0 for use in device identification, storage of encryption keys and credentials, and attestation of integrity measurements. Latest Version: TCG TPM v2.0 Provisioning Guidance Version 1.0, Revision 1.0... READ MORE

TCG Guidance for Securing Resource-Constrained Devices

This reference document provides implementation guidance for trusted platforms built with resource-constrained devices. This reference document is not a TCG Specification and therefore is not normative. Latest Version: TCG Guidance for Securing Resource- Constrained Devices Version 1.0, Revision 22 Previous Version: TCG Guidance for Securing Resource-Constrained Devices Version 1 Re... READ MORE

Multiple Stakeholder Model

The Multiple Stakeholder Model (MSM) is an informative reference document that describes use cases, recommended capabilities, and various implementation alternatives to allow multiple stakeholders to coexist safely on a mobile platform.  This document includes guidance on how to leverage TCG specifications to realize each alternative.  In particular, this document emphasizes the role of the Trus... READ MORE

TCG Storage Opal Integration Guidelines

This document provides guidelines on integrating SDs implemented according to the Opal Family of specifications. This includes a description of the ownership model utilized in the TCG Storage specifications; the SID authority and its role in managing the storage device; and the processes and guidelines for taking ownership of the TPer. This document also provides insight on integration of other Op... READ MORE

TCG TPM 2.0 Mobile Common Profile

The Trusted Computing Group has published three Trusted Platform Module (TPM) 2.0 Mobile Specifications: TPM 2.0 Mobile Reference Architecture TPM 2.0 Mobile Common Profile TPM 2.0 Mobile Command Response Buffer Interface The TPM 2.0 Mobile Reference Architecture Specification defines architecture for the implementation of a TPM 2.0 Library Specification-compliant TPM executing within a Prote... READ MORE

Guidance for Securing IoT Using TCG Technology Reference Document

This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases. Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu ... READ MORE

TCG Guidance for Securing IoT

This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases. Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu fro... READ MORE

TPM 2.0 Mobile Reference Architecture Specification

The Trusted Computing Group has published three Trusted Platform Module (TPM) 2.0 Mobile Specifications: TPM 2.0 Mobile Reference Architecture TPM 2.0 Mobile Common Profile TPM 2.0 Mobile Command Response Buffer Interface The TPM 2.0 Mobile Reference Architecture Specification defines architecture for the implementation of a TPM 2.0 Library Specification-compliant TPM executing within a Prot... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.