{"id":8540,"date":"2023-03-13T11:23:00","date_gmt":"2023-03-13T11:23:00","guid":{"rendered":"http:\/\/www.telecomstalk.com\/?p=8540"},"modified":"2023-03-13T11:33:13","modified_gmt":"2023-03-13T11:33:13","slug":"new-tcg-work-group-will-focus-on-data-centre-security","status":"publish","type":"post","link":"http:\/\/www.telecomstalk.com\/?p=8540","title":{"rendered":"New TCG Work Group will focus on data centre security"},"content":{"rendered":"\n<p>Operators\nwill be given the tools to enhance the security measures found within their\ndata centers as a result of the new Data Center Work Group formed at the <a href=\"http:\/\/www.trustedcomputinggroup.org.\">Trusted Computing Group (TCG).<\/a><\/p>\n\n\n\n<p>Data\ncenters play a crucial role for business operations across the globe, but they\nremain prime targets for cybercriminals. Should an interposer position\nthemselves between the Central Processing Unit (CPU) and a hardware Root of Trust\n\u2013 such as the Trusted Platform Module (TPM) &#8211; within a data center, they can\ncause significant damage by gaining possession of legitimate control signalling\nbetween the CPU and the TPM. Interposers can even inject their own boot code\ninto the CPU and wield an authorization key to fool a remote verifier to make\nthe TPM attest the integrity of fraudulent information. This allows them to\nsnoop, suppress and modify vital signals and measurements, and, as a result,\nwill be able to access and exploit secrets and information from within the data\ncenter, weaponizing it against the operator.<\/p>\n\n\n\n<p>To this\nend, the Data Center Work Group at TCG has been formed to establish trust\nwithin systems and components within a data center, focusing primarily on\ndeveloping protective measures against any active interposers within a system.\nThe Work Group will examine the existing attack enumerations against data\ncenters, and devise ways to avoid or mitigate them. These attacks include the\nfeeding of compromised boot code to the CPU, impersonations of the CPU to the\nTPM, the suppression and injection of false measurements to a legitimate TPM,\nand the redirection of legitimate measurements to an attacker controlled TPM.<\/p>\n\n\n\n<p>\u201cWith the\nformation of this Work Group, a TPM will be empowered to protect the resources\nand communication of a CPU to which it is bound with precise, given\nmeasurements\u201d, said Co-Chair of the Data Center Work Group, Dennis Mattoon.\n\u201cThe TPM will also be able to prove the measurements and the correct CPU\ninstance of a given object to a verifier. We look forward to developing our\nplans to continue establishing trusted computing within data centers\u201d.<\/p>\n\n\n\n<p>Dennis\nMattoon and Jeff Andersen have been confirmed as the Co-Chairs of the Work\nGroup. Mattoon is a Principal Software Development Engineer for Microsoft\nResearch, and Co-Chairs the Attestation, Supply Chain Security, DICE, and\nMarketing Work Groups at TCG. Andersen is a Staff Software Engineer at Google\nand became a member of the TCG in 2021.<\/p>\n\n\n\n<p>\u201cWe\u2019re\ndelighted to publicly announce the formation of the new Work Group\u201d, said\nCo-Chair Jeff Andersen. \u201cCurrent data center hardware designs make it difficult\nfor CPUs to be permanently bonded with the TPM, creating a gap for malicious\nentities to exploit. Our goal is to overcome the interposers operating within\nthis area and mitigate the significant threats they can bring to data centers\u201d.<\/p>\n\n\n\n<p>The Work\nGroup will also look at protecting the data center against hackers looking to\nclear platform configuration registers (PCRs) in the legitimate TPM by falsely\nasserting that the CPU has reset. As a result, operators will be able to trust\nthat the components and hardware found within the system are operating\nsuccessfully without the fear it may become weaponized by an attacker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Operators will be given the tools to enhance the security measures found within their data centers as a result of the new Data Center Work Group formed at the Trusted Computing Group (TCG).<\/p>\n<p>Data centers play a crucial role for &#8230; <span class=\"more-link\"><a href=\"http:\/\/www.telecomstalk.com\/?p=8540\" class=\"more-link\">Read More<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8540","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/8540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8540"}],"version-history":[{"count":1,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/8540\/revisions"}],"predecessor-version":[{"id":8541,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/8540\/revisions\/8541"}],"wp:attachment":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8540"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}