The Storage Work Group builds upon existing TCG technologies and philosophy, and focuses on standards for security services on dedicated storage systems. One objective is to develop standards and practices for defining the same security services across dedicated storage controller interfaces, including but not limited to ATA, Serial ATA, SCSI, FibreChannel, USB Storage, IEEE 1394, Network Attached Storage (TCP/IP), NVM Express, and iSCSI. Storage systems include disk drives, removable media drives, flash storage, and multiple storage device systems.
Jim Hatfield is a senior firmware engineer for Seagate Technology and has been an active leader in storage and security standards development since 2002. He is a founding member of the TCG Storage WG (2004), and is the author and editor of the TCG Storage Interface Interactions Specification. He is an officer or participant in many storage and security standards organizations (INCITS T10 and T13, SATA-IO, NVMe, IEEE (1667, 1619, 1912), Common Criteria (EE). He was part of the team that created the first self-encrypting disc drive (SED). With 40 years of experience in the tape, HDD and SSD storage industries, Jim provides the glue between security solutions and real-world storage interactions. He holds a B.A. in Computer Science and Mathematics.
Dave Landsman is Director of Industry Standards at Western Digital and has been active in storage standards development since 2008. He has done spec development at NVMe (Authenticated Boot, Write Protection), PCI-SIG (PCIe BGA, M.2), JEDEC (MO-276, MO-300, JESD 218/219, NVDIMM-P), SATA-IO (DevSleep, SATA BGA), INCITS T10/T13, and others. He was on the SATA-IO Board from 2012-2016, and is currently a Board member at NVMe (since 2012), and the Compact Flash Association (since 2016). Dave has been active in IEEE 1667 since 2008, and is currently the NVMe-TCG liaison with respect to NVMe-TCG collaboration on NVMe security requirements. He has presented TCG-NVMe joint work at the Flash Memory Summit. Dave holds a B.A. in Computer Science from the University of California, San Diego.
|Resource Name||Resource Type|
|TCG Storage Architecture Core Specification||Architecture|
|TCG Storage Security Subsystem Class: Opal||SSC|
|TCG Storage Security Subsystem Class: Opalite||SSC|
|TCG Storage Security Subsystem Class: Pyrite||SSC|
|TCG Storage Security Subsystem Class: Enterprise||SSC|
|TCG Storage Interface Interactions Specification (SIIS)||General|
|TCG Storage Core Spec Addendum: Secure Messaging||Architecture|
|TCG Storage Enterprise SSC Feature Set: PSK Secure Messaging||Feature Set|
|TCG Storage Feature Set: Block SID Authentication||Feature Set|
|TCG Storage Opal SSC Feature Set: PSID||Feature Set|
|TCG Storage Opal SSC Feature Set: PSK Secure Messaging||Feature Set|
|TCG Storage Opal SSC Feature Set: Single User Mode||Feature Set|
|TCG Storage Enterprise SSC Feature Set: Locking LBA Ranges Control||Feature Set|
|TCG Storage Opal SSC: Test Cases Specification||Certification|
|TCG Storage Protection Mechanisms for Secrets|
|TCG Storage Opal SSC Feature Set: Additional DataStore Tables|
|Save the Data SED Infographic||White Paper|
|TCG Storage Opal Integration Guidelines||White Paper|
|TCG Specification Architecture Overview||White Paper|
|TCG and NVM Express - TCG Storage, Opal, and NVMe||White Paper|
|SANS - Implementing Hardware Roots of Trust||White Paper|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.