Creating the Complete Trusted Computing Ecosystem: An Overview of the Trusted Software Stack (TSS) 2.0

Guidance

AN OVERVIEW OF THE TRUSTED SOFTWARE STACK (TSS) 2.0

High-end computing systems such as those used in financial institutions, critical industries (including healthcare), large data centers, and more require hardware-based security. These heavily regulated security applications must employ very expensive hardware security modules (HSMs).