The Storage Work Group builds upon existing TCG technologies and philosophy, and focuses on standards for security services on dedicated storage systems. One objective is to develop standards and practices for defining the same security services across dedicated storage controller interfaces, including but not limited to ATA, Serial ATA, SCSI, FibreChannel, USB Storage, IEEE 1394, Network Attached Storage (TCP/IP), NVM Express, and iSCSI. Storage systems include disk drives, removable media drives, flash storage, and multiple storage device systems.
|Resource Name||Resource Type|
|Save the Data SED Infographic||Infographic|
|Storage Work Group Storage Interface Interactions Specification||Specification|
|Storage Work Group Storage Security Subsystem Class: Enterprise Specification||Specification|
|Storage Work Group Storage Security Subsystem Class: Opal||Specification|
|TCG Storage Architecture Core Specification||Specification|
|TCG Storage Core Spec Addendum: Secure Messaging||Specification|
|TCG Storage Enterprise Feature Set: PSK Secure Messaging||Specification|
|TCG Storage Feature Set Block SID Authentication Specification||Specification|
|TCG Storage Opal Integration Guidelines||Reference Document|
|TCG Storage Opal Feature Set: PSID||Specification|
|TCG Storage Opal SSC Feature Set: PSK Secure Messaging||Specification|
|TCG Storage Opal SSC Feature Set: Single User Mode||Specification|
|TCG Storage Security Subsystem Class: Opalite||Specification|
|TCG Storage Security Subsystem Class: Pyrite||Specification|
|TCG Storage, Opal, and NVMe||White Paper|
|TCG Storage Enterprise SSC Feature Set Locking LBA Ranges Control Specification||Specification|
|Implementing Hardware Roots of Trust||White Paper|
|TCG Storage Protection Mechanisms for Secrets Specification||Specification|
|TCG Storage Opal SSC Feature Set: Additional DataStore Tables||Specification|
|TCG Storage Opal Test Cases||Specification|
|TCG Architecture Overview, Version 1.4||Specification|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.