The TPM 2.0 FIPS guidance is provided as a supporting document for FIPS 140-2 evaluation of a TPM 2.0 product compliant with TPM 2.0 library level 0 version 1.16. The intended audience for this document includes TPM manufacturers, FIPS Cryptographic Module Validation Program Laboratories and FIPS Evaluators.
This document describes additional development constraints or library interpretation necessary for a successful FIPS evaluation. The intent is to highlight areas of the specification that may require specific attention when the device is in a FIPS approved mode. If the general specification is in compliance with FIPS no guidance is provided on the topic. The organization of the document starting with Section 5 follows the FIPS 140-2 convention and language. Each section contains a FIPS 140-2 Summary section which contains the text from the FIPS 140-2 Security Requirements Summary table for the specific requirement and security level.
This specification targets FIPS 140-2 level 1 or level 2.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.