Storage Work Group Optical Storage Summary

Date Published: October, 01, 2008
Trusted Computing Group Optical Storage Summary
October 2008

The Trusted Computing Group has identified removable optical storage as a critical element of data security. The TCG Optical Storage Subgroup Security Subsystem Class (SSC) specification enables a more secure computing environment without compromising functional integrity. Its primary goal is helping users protect their information assets from compromise due to external software attack and/or physical loss or theft. This data at rest protection assures the optical disc owner that if their optical disc is lost or stolen, their data will not be accessible without proper authentication.

The Optical Storage Subgroup Security Subsystem Class specification enables
the following:
1) Encrypts all user data on all standard recordable optical discs
2) Provides access control to support organizational security policies with strong, n-factor authentication and Full Disc Encryption (FDE)
3) Employs the Trusted Computing Group as a forum for critical security review, system architecture and interoperability

Based on the growing number of security breaches involving lost or stolen optical discs and the continued governmental legislation requiring data security and breach notification, the marketplace is ready for a secure optical solution.

Initially, the solution will be used in many different market segments: governmental agencies, financial services, healthcare, insurance, and military. Eventually, the functionality will be available for all optical consumer applications, giving all users a secure way of protecting their data on removable optical discs.

More information on the Optical Storage Subgroup, the Storage Workgroup and TCG are at trustedcomputinggroup.org.

Contact: Anne Price
602-840-6495
[email protected]

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More