Hardware Root of Trust: The Fundamental Security Layer You Can Trust πŸ”’

Discover how Hardware Root of Trust provides a secure foundation for your systems, ensuring integrity and security from the very bottom of your device's architecture.

Hardware Root of Trust: The Fundamental Security Layer You Can Trust πŸ”’
DevConf
2.3K views β€’ Feb 25, 2019
Hardware Root of Trust: The Fundamental Security Layer You Can Trust πŸ”’

About this video

Secure systems are built on a layered model. At the very bottom of the stack you have to trust something - but what can you trust? A Hardware Root of Trust provides this critical foundation for secure systems. A HW RoT is included in virtually every server and laptop shipped over the last decade - yet is almost entirely unused! We will cover why this happened, what has changed, and what to expect in the future.

We will use TPM 2.0 as a Hardware RoT. We will introduce the TPM 2.0 module, the TCG Software Stack (TSS), cover the operations it can perform, and explore the userspace tools that simplify using TPM 2.0.

We will show a concrete example of the application of TPM, by using Clevis to automatically unlock an encrypted root volume on boot by storing an encrypted key in the TPM.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

2.3K

Likes

26

Duration

42:42

Published

Feb 25, 2019

User Reviews

4.3
(2)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.