The TCG Guidance for Securing Network Equipment provides recommendations and detailed advice on how TCG standards should be used to secure network equipment such as routers, switches, and firewalls. Physical network functions are considered in this document; virtualized network functions are not considered in this version.
While the TPM’s resistance to physical attack can help protect device identity, and can effectively prevent the leakage of credentials and other secrets, defense against physical attack is generally beyond the scope of this document.
TCG technology users are in the midst of a transition between TPM 1.2 and TPM 2.0; this document is constructed to cover both TPM 1.2 and TPM 2.0 applications, and to highlight differences when they’re important.
This is a Security Bloggers Network syndicated blog post authored by TCG Admin. Read the original post at: Trusted Computing Group