1 / 7

Initial Tiger Team Briefing New Dells with TPM

Initial Tiger Team Briefing New Dells with TPM. Peter Leight Richard Hammer May 2006. Overview of Trusted Platform Module (TPM). Hardware Chipset or Microcontroller Stores keys, passwords, or certificates Information stored on chip not hard drive Improves data security

tobit
Download Presentation

Initial Tiger Team Briefing New Dells with TPM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Initial Tiger Team BriefingNew Dells with TPM Peter Leight Richard Hammer May 2006

  2. Overview of Trusted Platform Module (TPM) • Hardware Chipset or Microcontroller • Stores keys, passwords, or certificates • Information stored on chip not hard drive • Improves data security • Secure Applications Utilize TPM hardware • Authentication • Encryption

  3. New Dell Laptops shipping TPM Capable • Latitude D820 • Hardware Disabled • Software Enabled, Possible Vulnerabilities • Latitude D610 • Hardware Disabled • Software Not installed

  4. Current Security Posture • Only Latitude D820s Deployed • Clean Laptop Installs • Defense-in-Depth • Network Firewall Egress/Ingress Rules • Checkpoint Integrity Personal Firewalls • VPN Configuration / Firewalls • IDS

  5. Recommendations • Tactical: New IDS Rules • Destination TCP/UDP port 10001 • TCP/UDP DNS Queries for wave.com • Strategic: Evaluation of New Technologies • Hard Drive Encryption • E-mail Encryption • Authentication

  6. TPM: Future Possibilities • Hard drive Encryption • RSA Acceleration • Boot Process Integrity • Any Application can Access TPM Hardware • E-mail Encryption • Secure Deletion • Document Management • Authentication • Multifactor • Biometrics

  7. Conclusion • Our current network posture mitigates risks from the new Dell D820 TPM implementation • Addition of new IDS rule will monitor to ensure our policies are effective • Disk and e-mail encryption technologies must be evaluated • TMP technology offers possible future security enhancements • Continued Vigilance Required when dealing with new technologies!

More Related