Unlocking Security: The Truth About HW Root of Trust with Russell Doty & Javier Martinez Canillas 🔒

Discover how hardware roots of trust like TPM 2.0 form the foundation of secure systems. Experts Russell Doty and Javier Martinez Canillas reveal what you need to know to trust your hardware this time!

Unlocking Security: The Truth About HW Root of Trust with Russell Doty & Javier Martinez Canillas 🔒
DevConf
241 views • Jan 26, 2018
Unlocking Security: The Truth About HW Root of Trust with Russell Doty & Javier Martinez Canillas 🔒

About this video

Secure systems are built on a layered model. You ultimately have to trust something - but what? TPM 2.0 is a Hardware RoT (Root of Trust), including the TPM 2.0 module, the TCG Software Stack (TSS), operations it can perform, and userspace tools that simplify using TPM 2.0. We also cover the TPM 2.0 Resource Manager, a new feature that is critical to enabling multiple users and applications to use the TPM. In addition we will go over the implementation of TPM in Fedora and RHEL. We will demo TPM using Clevis to automatically unlock an encrypted root volume on boot with the master key secured by TPM. Beyond Clevis we will explore other uses of TPM 2.0 including Trusted Boot, secure systems identity, protected keyring, and protected certificates.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

241

Likes

2

Duration

24:01

Published

Jan 26, 2018

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.