3.4 TPM and HSM Flashcards
What is a Hardware Root of Trust (RoT)?
The foundation for secure operations in a computing system, ensuring secure boot and system integrity.
What is the primary purpose of a Trusted Platform Module (TPM)?
To provide secure storage for cryptographic keys and support system security features like secure boot and encryption.
What types of cryptographic operations does TPM support?
Random number generation, RSA key generation, encryption, and hashing.
How does TPM enhance full-disk encryption tools like BitLocker?
By securely storing encryption keys and ensuring the system is not tampered with.
Where is TPM typically managed in a system?
In UEFI settings or through operating system tools like tpm.msc in Windows.
What is a Hardware Security Module (HSM)?
A physical device for secure cryptographic key generation and storage, often used in enterprise environments.
What are the common forms of HSMs?
Internal cards, rack-mounted systems, and USB-based devices.
How does HSM minimize human error in encryption processes?
By automating cryptographic key management and operations.
What is the primary use of HSMs?
Securing sensitive data and supporting large-scale cryptographic operations in enterprises.
What is the difference between TPM and HSM in terms of integration?
TPM is embedded in most modern motherboards, while HSM is a standalone appliance or external device.
How does TPM ensure system integrity during boot?
By verifying firmware and operating system integrity via secure boot.
What key feature makes HSM ideal for enterprise encryption?
It provides secure, automated encryption and decryption with minimal human interaction.
What is the role of the Endorsement Key (EK) in TPM?
It is a unique, unchangeable key used for system authentication and security operations.
What security protocols rely on TPM?
Secure boot, full-disk encryption, and cryptographic key protection.
When should HSMs be deployed instead of TPMs?
In high-security environments requiring advanced encryption and large-scale cryptographic processes.