Securing TPM Secrets with TXT and Kernel Signatures
Offered By: Linux Foundation via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge approach to securing data in TPM2's NVRAM using Intel's TXT and tboot extensions for kernel signature verification. Delve into the design and progress of a system that aims to restrict access to TPM2-stored data exclusively to kernels signed by authorized entities, while maintaining robustness during kernel upgrades and downgrades. Compare this innovative solution to existing methods employing traditional TXT and UEFI Secure Boot, understanding their limitations in terms of protection and usability. Gain insights from Paul Moore of Cisco as he presents this work-in-progress, offering a comprehensive look at enhancing data security in modern computing environments.
Syllabus
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco
Taught by
Linux Foundation
Tags
Related Courses
VMware vSphere 7 Professional: 04 Securing a vSphere DeploymentLinkedIn Learning vSphere 6.7 Professional Part 04: Securing a Deployment
LinkedIn Learning Protecting Devices and Applications in Microsoft 365
Pluralsight The One Weird Trick SecureROM Hates
media.ccc.de via YouTube Apache Mynewt Bootloader for Reliable and Secure Firmware Upgrades
Linux Foundation via YouTube