Connectivity from companies to their suppliers and the many others involved in complex manufacturing operations presents a challenging IT security problem – largely because so many elements of this supply chain and its connectivity are beyond the control of the company itself.
Why is supply chain security an issue? The U.S. government has noted that the supply chain could be exploited or disrupted. This is where trust comes in. TCG experts have published a short new paper on the topic of supply chain security, indicating how trust can be introduced using various TCG technologies to help reduce vulnerabilities and introduce ways to tighten up the supply chain for security.
TCG’s TPM (http://www.trustedcomputinggroup.org/work-groups/trusted-platform-module/) and TNC (http://www.trustedcomputinggroup.org/work-groups/trusted-network-communications/) can play key roles in securing the supply chain. The new paper from TCG highlights how.
Learn more about this important area of security(http://www.trustedcomputinggroup.org/trusting-supply-chain/)
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.