Overview
Explore how TPM 2.0 and SPIRE can be utilized to architect secure edge and hybrid systems in this informative conference talk. Delve into the capabilities of the TPM 2.0 device, a secure enclave found in most recent servers, workstations, and laptops. Learn about different types of TPMs, including virtualized options, and understand key concepts such as selectors, trust, and TPM verification. Gain insights into the threat model for CI systems and TPM policy implementation. Watch a practical demonstration showcasing the integration of TPM and SPIRE technologies. Discover future developments in this field and participate in a Q&A session to deepen your understanding of securing edge systems.
Syllabus
Intro
Coles background
TestifySec
Threat Model CI Systems
TPM Policy
SPIRE
TPM
Demo Overview
What is a TPM
Types of TPMs
Virtualized TPMs
Selectors
Trust
TPM Verification
Demo
Future Work
QA
Taught by
CNCF [Cloud Native Computing Foundation]