Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now!

Date Published: July, 20, 2017

Trusted Computing Group recently announced new work to secure the critical network gear that the Internet and connected things rely on. The group is now seeking input from the industry through Sept. 11, 2017. Input can be sent to admin@trustedcomputinggroup.org.

TCG Guidance for Securing Network Equipment was developed to address the integrity of network equipment, including routers, switches, and firewalls critical to protecting data in motion, data at rest and the equipment itself. However, increasingly sophisticated and frequent attacks have compromised networks across the globe, putting business operation, financial information, and personal data at risk.

The document provides recommendations and detailed advice on how TCG standards should be used to secure network equipment such as routers, switches, and firewalls. Physical network functions are considered in this document; virtualized network functions are not considered in this version. While the TPM’s resistance to physical attack can help protect device identity, and can effectively prevent the leakage of credentials and other secrets, defense against physical attack is generally beyond the scope of this document. TCG technology users are in the midst of a transition between TPM1.2 and TPM2.0; this document is constructed to cover both TPM1.2 and TPM2.0 applications and to highlight differences when they’re important.

We welcome and encourage those in industry to review and input on this document at: https://trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_NetEq_1_0r26b_Public-Review.pdf

Input can be sent to: admin@trustedcomputinggroup.org

For more information, you can join TCG in a free webcast Tues., July 25, 10:00 a.m.  with Steve Hanna, Infineon and Michael Eckel, Huawei Technologies. More info and registration here:

Further reading on the IoT and TCG’s security can be found at: https://trustedcomputinggroup.org/securing-insecure-iot/.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.