![]() ![]() #XIAOPAN 6.4.1 VMWARE HOW TO USE GUIDE SOFTWARE#Rather than relying on the detection of malware, Intel TXT builds trust into a known software environment and thus ensures that the software being executed hasn’t been compromised. Security policies based on a trusted platform or pool status can then be set to restrict (or allow) the deployment or redeployment of virtual machines (VMs) and data to trusted platforms with known security profiles. The corresponding signature at the time of future launches can then be compared against that known-good state to verify a trusted software launch, to execute system software, and to ensure that cloud infrastructure as a service (IaaS) has not been tampered with. The technology provides a signature that represents the state of an intact system’s launch environment. Intel TXT reduces the overall attack surface for both individual systems and compute pools. Because of the escalating sophistication of malicious threats, mainstream organizations must employ ever-more stringent security requirements and scrutinize every aspect of the execution environment. Intel TXT is compact and difficult to defeat or subvert, and it allows for flexibility and extensibility to verify the integrity of platform components during boot and launch, including BIOS, operating system loader, and hypervisor. Intel TXT is the hardware basis for mechanisms that validate platform trustworthiness during boot and launch, which enables reliable evaluation of the computing platform and its protection level. 7.3.4 Intel Trust Attestation Solution (Enterprise Edition) Dashboard.7.3.3 Deploying Intel Trust Attestation Solution (Enterprise Edition).7.3 Intel Trust Attestation Solution (Enterprise Edition). ![]() 7.2.3 Red Hat Fedora*-Specific OAT Deployment Guidelines.7.2.2 General OAT Deployment Guidelines.6.3 Governance, Risk, and Compliance (GRC).6.2 Security Information Event Management (SIEM).6.1.1 Confidential Data and Sensitive Workloads.3.2.2 Platform Configuration Registers (PCRs)Ĥ Implementing Intel® TXT on Supported Hardware and SoftwareĦ Management of Trusted Systems with Use Cases.3.1 Measuring and Validating the Environment.1 Overview of Benefits from Intel® Trusted Execution Technology (Intel® TXT)ģ Measured Launch Environment and Trusted Launch Sequence ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |