ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    TPM module - what is it used for?

    IT Discussion
    tpm
    9
    22
    1.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      StorageNinja Vendor @scottalanmiller
      last edited by

      @scottalanmiller said in TPM module - what is it used for?:

      That's the norm, yes. Anyone looking for data, that's what they do. That's always the fear in datacenters. A 2.5" drive is "easy" to steal. It is loose, and tiny, fits in a pocket or an arm pit. A server is essentially impossible to steal from any real location.

      Running out of a DC with a DL380 doesn't happen. Someone bulk sells the server on eBay does.

      Real encryption keeps the keys in a remote KIMP server (what you'll see for any DISA/STIG system etc).

      Realistically you use a TPM for detecting supply chain attacks (validating firmware, validating boot loader, EFI VIBs etc) is what ESXi uses it for.

      ESXi-and-TPM-2.0-Slide.gif

      https://blogs.vmware.com/vsphere/2018/04/vsphere-6-7-esxi-tpm-2-0.html

      scottalanmillerS 1 Reply Last reply Reply Quote 3
      • scottalanmillerS
        scottalanmiller @StorageNinja
        last edited by

        @StorageNinja said in TPM module - what is it used for?:

        Real encryption keeps the keys in a remote KIMP server (what you'll see for any DISA/STIG system etc).

        I've seen shops that require a human to apply the key every time.

        1 Reply Last reply Reply Quote 0
        • 1
        • 2
        • 2 / 2
        • First post
          Last post