Intel D865GRH D865GRH_TechProdSpec. - Page 57

Security Precautions

Page 57 highlights

Product Description procedures may allow the migratable keys to be recovered and may restore access to encrypted data. Read the Security Precautions for Emergency Recovery File Back Up Procedures. • TPM Keys are Hierarchical: All TPM keys have a place within a hierarchy. Within this hierarchy, keys must be loaded into the TPM before child keys can be used. It may not be obvious that any particular key is child or parent. If a key is backed up but the parent key is either not available or the password for the parent key is not available, the associated data will not be available. Read the Security Precautions for Emergency Recovery File Back Up Procedures. 1.13.3 Security Precautions Security, like any other aspect of computer maintenance, requires planning. What is unique about security has to do with understanding who are "friends" and who are adversaries. The TPM provides mechanisms to enable the owner/user to protect their information from adversaries. To provide this protection, the TPM effectively puts "locks" around the data. Just like physical locks, if keys or combinations are lost, the assets (data) may be inaccessible not only to adversaries, but also to the asset owner/user. The TPM provides two classes of keys: migratable and non-migratable. Migratable keys are designed to protect data that can be used (unencrypted) on more than one platform. This has the advantage of allowing the key data to be replicated (backed-up and restored) to another platform. This may be because of user convenience (someone uses more than one platform, or the data needs to be available to more than one person operating on different platforms). This type of key also has the advantage in that it can be backed-up and restored from a defective platform onto a new platform. However, migratable keys may not be the appropriate level of protection (for example, the user wants the data restricted to a single platform) needed for the application. This requires a non-migratable key. Non-migratable keys carry with them a usage deficit in that while the key may be backed-up and restored (protected from hard disk failure), they are not protected against system or TPM failure. The very nature of a non-migratable key is that they can be used on one and only one TPM. In the event of a system or TPM failure, all non-migratable keys and the data associated with them will be inaccessible and unrecoverable. CAUTION The following precautions and procedures may assist in recovering from any of the previously listed situations. Failure to implement these security precautions and procedures may result in unrecoverable data loss. 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142

Product Description
57
procedures may allow the migratable keys to be recovered and may restore access to encrypted
data.
Read the Security Precautions for Emergency Recovery File Back Up Procedures.
TPM Keys are Hierarchical:
All TPM keys have a place within a hierarchy.
Within this
hierarchy, keys must be loaded into the TPM before child keys can be used.
It may not be
obvious that any particular key is child or parent.
If a key is backed up but the parent key is
either not available or the password for the parent key is not available, the associated data will
not be available.
Read the Security Precautions for Emergency Recovery File Back Up
Procedures.
1.13.3
Security Precautions
Security, like any other aspect of computer maintenance, requires planning.
What is unique about
security has to do with understanding who are
friends
and who are adversaries.
The TPM
provides mechanisms to enable the owner/user to protect their information from adversaries.
To
provide this protection, the TPM effectively puts
locks
around the data.
Just like physical locks,
if keys or combinations are lost, the assets (data) may be inaccessible not only to adversaries, but
also to the asset owner/user.
The TPM provides two classes of keys:
migratable and non-migratable.
Migratable keys are
designed to protect data that can be used (unencrypted) on more than one platform.
This has the
advantage of allowing the key data to be replicated (backed-up and restored) to another platform.
This may be because of user convenience (someone uses more than one platform, or the data needs
to be available to more than one person operating on different platforms).
This type of key also
has the advantage in that it can be backed-up and restored from a defective platform onto a new
platform.
However, migratable keys may not be the appropriate level of protection (for example,
the user wants the data restricted to a single platform) needed for the application.
This requires a
non-migratable key.
Non-migratable keys carry with them a usage deficit in that while the key may be backed-up and
restored (protected from hard disk failure), they are not protected against system or TPM failure.
The very nature of a non-migratable key is that they can be used on one and only one TPM.
In the
event of a system or TPM failure, all non-migratable keys and the data associated with them will
be inaccessible and unrecoverable.
CAUTION
The following precautions and procedures may assist in recovering from any of the previously
listed situations.
Failure to implement these security precautions and procedures may result in
unrecoverable data loss.