Overview
Learn about secure remote system enrollment, Platform Configuration Registers (PCR) for file attestation, and system integrity in this advanced lecture on Trusted Platform Modules (TPM). Explore the Enhanced System API defined by the Trusted Computing Group specification, understand TPM 2.0 Policy (extended authorization), and master the technique of sealing keys against PCR values - a widely implemented security practice across industries. Building upon foundational TPM concepts, discover how to leverage these security capabilities for robust system protection and attestation. Part of a comprehensive TPM training series, this 10-minute lecture delivers practical insights for implementing advanced TPM security features in real-world applications.
Syllabus
Intermediate Trusted Platform Modules (TPMs) usage TC1102 Lecture F Part 2
Taught by
OpenSecurityTraining2