Securing TPM Secrets in the Datacenter

Securing TPM Secrets in the Datacenter

Linux Foundation via YouTube Direct link

What's Needed?

19 of 21

19 of 21

What's Needed?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing TPM Secrets in the Datacenter

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Joy Latten
  3. 3 Q&A During the Presentation
  4. 4 The Trusted Platform Module (TPM)
  5. 5 UEFI Secure Boot and the TPM
  6. 6 TPM PCR 7 Isn't Always Stable
  7. 7 TPM Extended Authorizations (EA)
  8. 8 Our Problem
  9. 9 Our Solution: The Basics
  10. 10 The Boot Process: UEFI Firmware Boot
  11. 11 The Boot Process: Bootloader
  12. 12 The Boot Process: Kernel and OS
  13. 13 Managing the TPM
  14. 14 TPM EA Policy Revocation
  15. 15 Development Systems
  16. 16 The Implementation
  17. 17 Stubby
  18. 18 TPM Provisioning Requirements
  19. 19 What's Needed?
  20. 20 Now what?
  21. 21 More Information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.