[フレーム]
You are viewing this page in an unauthorized frame window.

This is a potential security issue, you are being redirected to https://csrc.nist.gov.

You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    Publications

NIST CSWP 14 (Initial Public Draft)

Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases

Documentation Topics

Date Published: April 28, 2020
Comments Due: June 2, 2020 (public comment period is CLOSED)
Email Questions to: [email protected]

Author(s)

Michael Bartock (NIST), Murugiah Souppaya (NIST), Ryan Savino (Intel), Timothy Knoll (Intel), Uttam Shetty (Intel), Mourad Cherfaoui (Intel), Raghuram Yeluri (Intel), Karen Scarfone (Scarfone Cybersecurity)

Announcement

The foundation of any data center or edge computing security strategy should involve securing the platform on which data and workloads will be executed and accessed. The physical platform represents the first layer of a layered security approach and provides initial protections to help ensure that higher-layer security controls can be trusted. This white paper explains hardware-based security techniques and examples of technology that can improve platform security and data confidentiality for cloud data centers and edge computing.

Abstract

In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be executed and accessed. The physical platform represents the first layer for any layered security approach and provides the initial protections to help ensure that higher-layer security controls can be trusted. This white paper explains hardware-based security techniques and technologies that can improve platform security and data protection for cloud data centers and edge computing.
In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the... See full abstract
In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be executed and accessed. The physical platform represents the first layer for any layered security approach and provides the initial protections to help ensure that higher-layer security controls can be trusted. This white paper explains hardware-based security techniques and technologies that can improve platform security and data protection for cloud data centers and edge computing.
Hide full abstract

Keywords

confidential computing; container; hardware-enabled security; hardware security module (HSM); secure enclave; trusted execution environment (TEE); trusted platform module (TPM); virtualization
Control Families

Configuration Management; Identification and Authentication; System and Information Integrity

Documentation

Publication:
https://doi.org/10.6028/NIST.CSWP.14.ipd
Download URL

Supplemental Material:
Local Download (pdf)

Document History:
04/28/20: CSWP 14 (Draft)
05/27/21: IR 8320 (Draft)
10/27/21: IR 8320 (Draft)
05/04/22: IR 8320 (Final)

Topics

Security and Privacy

general security & privacy, roots of trust

Technologies

biometrics, BIOS, hardware

Activities and Products

reference materials

AltStyle によって変換されたページ (->オリジナル) /