TPM module - what is it used for?
-
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
You hear about HD's being stolen, but not the whole unit?
-
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
Should have mentioned, if the TPM module is put to use with encryption, taking the drives is useless. The need the entire system.
-
@Dashrender said in TPM module - what is it used for?:
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
You hear about HD's being stolen, but not the whole unit?
I have. 2U Rack unit They bad guys didn't have a screw driver handy. Pressed the power button, pop the drives and out the door.
-
@pmoncho said in TPM module - what is it used for?:
@Dashrender said in TPM module - what is it used for?:
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
You hear about HD's being stolen, but not the whole unit?
I have. 2U Rack unit They bad guys didn't have a screw driver handy. Pressed the power button, pop the drives and out the door.
LOL - stealing just to steal it sounds like - unless they were targeted...
-
@Dashrender said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
@Dashrender said in TPM module - what is it used for?:
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
You hear about HD's being stolen, but not the whole unit?
I have. 2U Rack unit They bad guys didn't have a screw driver handy. Pressed the power button, pop the drives and out the door.
LOL - stealing just to steal it sounds like - unless they were targeted...
It was a lawyers office so I believe it was.
-
OK, so it has some value in Windows.
What's the operation of TPM on linux then? -
@Pete-S said in TPM module - what is it used for?:
OK, so it has some value in Windows.
What's the operation of TPM on linux then?Same. Bitlocker is just one of the options on Windows. Linux has similar options. They were just using an example, nothing about TPM is related to Windows.
-
@Dashrender said in TPM module - what is it used for?:
@scottalanmiller said in TPM module - what is it used for?:
@pmoncho said in TPM module - what is it used for?:
Bad guy steals just hard drives, no worries. Owner safe.
This is a big deal as this is how most people manage to make off with data.
You hear about HD's being stolen, but not the whole unit?
That's the norm, yes. Anyone looking for data, that's what they do. That's always the fear in datacenters. A 2.5" drive is "easy" to steal. It is loose, and tiny, fits in a pocket or an arm pit. A server is essentially impossible to steal from any real location.
-
@scottalanmiller said in TPM module - what is it used for?:
That's the norm, yes. Anyone looking for data, that's what they do. That's always the fear in datacenters. A 2.5" drive is "easy" to steal. It is loose, and tiny, fits in a pocket or an arm pit. A server is essentially impossible to steal from any real location.
Running out of a DC with a DL380 doesn't happen. Someone bulk sells the server on eBay does.
Real encryption keeps the keys in a remote KIMP server (what you'll see for any DISA/STIG system etc).
Realistically you use a TPM for detecting supply chain attacks (validating firmware, validating boot loader, EFI VIBs etc) is what ESXi uses it for.
https://blogs.vmware.com/vsphere/2018/04/vsphere-6-7-esxi-tpm-2-0.html
-
@StorageNinja said in TPM module - what is it used for?:
Real encryption keeps the keys in a remote KIMP server (what you'll see for any DISA/STIG system etc).
I've seen shops that require a human to apply the key every time.