TCG’s Embedded System and IoT Focus

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary December 2010 Irvine, CA – PWG Meeting Ira McDonald (High.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary and IDS WG TCG Activity Summary August 2010 Bagsvaerd, Denmark – PWG Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 10 June 2010 Rochester, NY – PWG F2F Meeting Ira McDonald.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 7 April 2010 Camas, WA – PWG F2F Meeting Ira McDonald (High.
1Copyright © 2011, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary May 2011 Webster, NY – PWG Meeting Ira McDonald (High North.
Open Interconnect Consortium Introduction for oneM2M
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Hardware-Rooted Security in Mobile Devices Andrew Regenscheid Lead, Hardware-Rooted Security Computer Security Division.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
TRUST and STANDARDIZATION
Aircraft is a Node on the Internet
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Session Agenda Designed to address BIOS Limitations Needed for the larger server platforms (Intel-HP Itanium) First called Intel Boot Initiative.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Trusted Computing Platform Alliance
SODA Archiving October 2013
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Accessibility Update TC100 AGS – May 15, FCC Video Programming Accessibility Advisory Committee (VPAAC)
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Doc.: IEEE /0152r0 Submission November 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Device Security Standards Overview Notice: This document.
Trusted Platform Module as Security Enabler for Cloud Infrastructure as a Service (IaaS). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
*Trusted Platform Module
Presentation Title Presenter Session Document Name/Version Submission/Revision date: XX April 2016.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources 1.
ANSI – ESOs meeting Washington February 2017
Connected Vehicles in the Internet of Things Presenter
Lasse Andresen Founder / CTO ForgeRock
Enhancing Network Security
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
Open Platform 3.0™ Overview – 3rd August 2016 Dr Christopher J Harding
Issues need harmonization
LAS16-203: Platform Security Architecture for embedded devices
Chapter 14 Network Management
ITU-T Focus Group on Cloud Computing
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Security of In-Vehicle Software
Protecting Network Equipment
Comments on 18 mitigations proposed by OICA(TFCS-06-11)
Building a Trustworthy Computer
ETSI STF 529 on Attribute Based Encryption for IoT, Cloud, mobile
Outline What does the OS protect? Authentication for operating systems
IHE Eye Care Process and Timeline
ISO Update and Priorities
Medical Device Cybersecurity Legislative Activities - Overview
Outline What does the OS protect? Authentication for operating systems
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
Building hardware-based security with a Trusted Platform Module (TPM)
Standardization in Automotive Infotainment with GENIVI and CCC
ISO Update and Priorities
IEEE Cloud Computing Standards Committee
2 OVERVIEW Cybersecurity initiative launched in July 2015 to create a trusted environment to address Cybersecurity -- Focus on the security needs of operators.
Platform Architecture
Engage with running SAE projects
Future Strategy and Work Plan
DSC Contract Management Committee Meeting
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Alliance for Telecommunications Industry Solutions (ATIS) Update
DSC Contract Management Committee Meeting
Energy Storage & Cyber Security
Presentation transcript:

TCG’s Embedded System and IoT Focus Presentation Title TCG’s Embedded System and IoT Focus June 2016 Claire Vishik Version (17 September 2018) 6:12:34 AM © 2015 Trusted Computing Group

Who is TCG? : Mission The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. TCG specification are public when completed. Core specification is an ISO/IEC standard: ISO/IEC11889

TCG: Membership Total Membership including Commercial, Liaison, Invited Experts and Government participants: 100+ MEMBER ORGANIZATIONS Adopters: Contributors: Promoters: Current Membership List Available: http://www.trustedcomputinggroup.org/ about_tcg/tcg_members

© 2015 Trusted Computing Group Presentation Title Internet of Things: General Guidance for Securing IoT Using TCG Technology Establish and Protect Device Identity Protect Against Malware Infection Protect Against Hardware Tampering Protect Data at Rest Consider Device Resale or Decommissioning Use Cryptographic Protocols Consider Provisioning Protect Audit Logs Support Remote Manageability Accommodate Legacy Hardware © 2015 Trusted Computing Group © 2015 Trusted Computing Group

© 2015 Trusted Computing Group Presentation Title Automotive: Example Purpose & Scope Develop the necessary Trusted Computing specifications to support an integrated framework for a wide range of embedded computing applications for Vehicle Architectures. Scope: Automotive (also Avionics/Maritime) Initial Use Cases: Software Updating/Installation Remote Services Telematics Services Capability Considerations: Attestation Severe Environment Reliability Flexible (Crypto) Key Mgmt. © 2015 Trusted Computing Group © 2015 Trusted Computing Group

© 2015 Trusted Computing Group Presentation Title Internet of Things: Publications TCG: Guidance for Securing IOT Using TCG Technology (14Sept2015) TCG: Architect’s Guide: IOT Security (July2015) TCG: Architect’s Guide: Industrial Control Systems (ICS) Security Using TNC Technology (Oct2013) TCG: Architect’s Guide: Cybersecurity (Oct2013) TCG: TCG TPM 2.0 Automotive Thin Profile (16March2015) TCG: FAQ Trusted Computing Group and Automotive Security (19March2015) TCG: Securing Auto Data: A Demonstration of a Secure Remote Firmware Update with a Trust Platform Module (TPM) for the Vehicle ECU (April2015) TCG: Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected (June2012) © 2015 Trusted Computing Group © 2015 Trusted Computing Group