Trusted Computing Group
Storage Interface Interactions Specification Summary
January 2009
The Storage Work Group of the Trusted Computing Group has several specifications. These are written in an interface-agnostic manner for trusted peripherals containing any storage medium.
The Storage Interface Interactions specification provides the ‘glue' between these high-level specifications and th... READ MORE
Trusted Computing Group Storage Work Group Summary
Enterprise Security Subsystem Class Specification
January 2009
Based on the growing number of security breaches involving lost or stolen storage and the continued governmental legislation requiring data security and breach notification, the marketplace is ready for a secure storage solution.
The Trusted Computing Group (TCG) has identified s... READ MORE
Trusted Computing Group
TCG Opal SSC Specification Summary
January 2009
The Trusted Storage Architecture Core Specification developed in the Storage Work Group provides a comprehensive definition of TCG-related functions for a TCG trusted storage device. However, trusted storage devices for particular target markets do not need to implement all Core
Specification functionalit... READ MORE
The amount of metadata generated by all the devices on the network is exploding. Security automation has become a big category and way to coordinate all this data so networks become smarter, even self-healing, while protecting critical data, systems and the network itself. Trusted Computing Group created its IF-MAP (Metadata Access Protocol) to enable this coordination.
IF-MAP is a standard clie... READ MORE
For more information on joining the Trusted Computing Group as a corporate or liaison member, please visit: Join Now!
How-To Architect's Guides:
TCG has published a series of architect's guides that provide step-by-step blueprints with examples and tips. In each of the guides, companies worldwide have built on TCG's specifications to provide tools that provide security. Now those in the trench... READ MORE
PC Client TPM Certification
The TCG has accepted requirements created by the Compliance PC Client TPM Sub Work Group for a TPM product to achieve certification and receive recognition from TCG on the list below. For TCG members looking for information on how products may be added to the PC Client TPM Certified Products List, please review the TCG Certification Program Page. For non-TCG... READ MORE
Authentication
Trusted Platform Module (TPM): Built-in Authentication
To date, more than 500 million PCs have shipped with the Trusted Platform Module (TPM), an embedded crypto capability that supports user, application, and machine authentication with a single solution. Enterprise systems from a variety of vendors, including Dell, HP, Lenovo and others, include the TPM, as do a new class of u... READ MORE
Cybersecurity Innovation Forum and Expo
January 28, 2014 - January 30, 2014
Baltimore, MD
The 2014 Cybersecurity Innovation Forum is a three-day event sponsored by the National Cybersecurity Center of Excellence (NCCoE) with the Department of Homeland Security, the National Institute of Standards and Technology, and the National Security Agency as primary participating organizations. Cybersec... READ MORE
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission).
The specification was submitted to the ISO/IEC JTC 1* by the Trusted Computing Group (TCG), following the JTC 1 Publicly Available Spe... READ MORE
TCG Draft Documents Currently in Public Review:
TCG Storage Security Subsystem Class: Ruby Version 1.0 Revision 1.00
Storage Work Group Specification
Review Period: November 2, 2018 - January 2, 2019 5:00pm Pacific
Protection Profile Automotive-Thin Specific TPM for TCG TPM 2.0 Automotive Thin Profile Family "2.0" Level 00 Version 0.25
Security Evaluation Work Group S... READ MORE