Virtualization is rapidly growing in popularity on both client and server systems. The extension of trusted computing to virtualization is a logical next step for TCG and trusted computing in general. From the perspective of a virtual machine, it runs in a virtualized environment identically to the way it runs if it was running natively on a physical platform. The Virtual Machine’s software and trust properties should be identical in both environments. From the perspective of trusted computing software, this means that each VM and hypervisor must have its own TPM. But in a virtualized platform, there may be only one physical TPM and it is owned by the base hypervisor (also called a Virtual Machine Manager or VMM).
Resource Name | Resource Type |
---|---|
Virtualized Trusted Platform Architecture Specification | Specification |
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.