TCG Design, Implementation, and Usage Principles (Best Practices)


The intention of this document is to lay out the principles underlying the design of the TCG specifications.

The Trusted Computing Group (TCG) has set for itself the ambitious goals to improve the security of the platform and infrastructure while:

1. Preserving privacy, backward compatibility, and owner control
2. Promoting ease-of-use
3. Designing the technology so that it is interoperable
4. Ensuring that the user’s data, while secure and protected, remains portable and accessible as needed in alternative modalities

Many of these principles are already inherent in the TCG specifications. The initial release of the TCG Design, Implementation, and Usage Principles document applied to implementations based on TPMs. This updated version applies to implementations based on all TCG specifications, whether hardware or software based TCG technology.