Based on the growing number of security breaches involving lost or stolen storage and the continued governmental legislation requiring data security and breach notification, the marketplace is ready for a secure storage solution.
The Trusted Computing Group (TCG) has identified storage as a critical element of data security. The Storage Work Group within TCG develops specifications to address the security requirements for storage. With the release of the Enterprise Security Subsystem Class (SSC) specification, the Storage Work Group addresses security for fixed-media storage devices such as hard disc drives in high performance storage systems. This enables a more secure computing environment without compromising functional integrity. The primary goal is helping users protect their information assets from compromise. Data at rest protection assures the storage owner that if their storage device is lost or stolen, their data will not be accessible without proper authentication.
The Enterprise SSC specification enables the following:
1) Encrypts all user data on media (Full Disc Encryption – FDE using self
encrypting storage devices),
2) Provides access control to support organizational security policies with strong authentication and
3) Employs the Trusted Computing Group as a forum for critical security review, system architecture and interoperability
The Enterprise SSC specification was developed for easy of implementation while not compromising security. This specification supports the Enterprise
storage environment where there is a requirement for:
1) Minimum device security configuration during installation
2) The ability to bring devices On-Line quickly and
3) High performance with low overhead.
More information on the TCG and TCG Storage Work Group can be found on the TCG Web site.
Contact: Anne Price
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.