70 likes | 408 Views
Initial Tiger Team Briefing New Dells with TPM. Peter Leight Richard Hammer May 2006. Overview of Trusted Platform Module (TPM) . Hardware Chipset or Microcontroller Stores keys, passwords, or certificates Information stored on chip not hard drive Improves data security
E N D
Initial Tiger Team BriefingNew Dells with TPM Peter Leight Richard Hammer May 2006
Overview of Trusted Platform Module (TPM) • Hardware Chipset or Microcontroller • Stores keys, passwords, or certificates • Information stored on chip not hard drive • Improves data security • Secure Applications Utilize TPM hardware • Authentication • Encryption
New Dell Laptops shipping TPM Capable • Latitude D820 • Hardware Disabled • Software Enabled, Possible Vulnerabilities • Latitude D610 • Hardware Disabled • Software Not installed
Current Security Posture • Only Latitude D820s Deployed • Clean Laptop Installs • Defense-in-Depth • Network Firewall Egress/Ingress Rules • Checkpoint Integrity Personal Firewalls • VPN Configuration / Firewalls • IDS
Recommendations • Tactical: New IDS Rules • Destination TCP/UDP port 10001 • TCP/UDP DNS Queries for wave.com • Strategic: Evaluation of New Technologies • Hard Drive Encryption • E-mail Encryption • Authentication
TPM: Future Possibilities • Hard drive Encryption • RSA Acceleration • Boot Process Integrity • Any Application can Access TPM Hardware • E-mail Encryption • Secure Deletion • Document Management • Authentication • Multifactor • Biometrics
Conclusion • Our current network posture mitigates risks from the new Dell D820 TPM implementation • Addition of new IDS rule will monitor to ensure our policies are effective • Disk and e-mail encryption technologies must be evaluated • TMP technology offers possible future security enhancements • Continued Vigilance Required when dealing with new technologies!