Operators will be given the tools to enhance the security measures found within their data centers as a result of the new Data Center Work Group formed at the Trusted Computing Group (TCG).
Data centers play a crucial role for business operations across the globe, but they remain prime targets for cybercriminals. Should an interposer position themselves between the Central Processing Unit (CPU) and a hardware Root of Trust – such as the Trusted Platform Module (TPM) – within a data center, they can cause significant damage by gaining possession of legitimate control signalling between the CPU and the TPM. Interposers can even inject their own boot code into the CPU and wield an authorization key to fool a remote verifier to make the TPM attest the integrity of fraudulent information. This allows them to snoop, suppress and modify vital signals and measurements, and, as a result, will be able to access and exploit secrets and information from within the data center, weaponizing it against the operator.
To this end, the Data Center Work Group at TCG has been formed to establish trust within systems and components within a data center, focusing primarily on developing protective measures against any active interposers within a system. The Work Group will examine the existing attack enumerations against data centers, and devise ways to avoid or mitigate them. These attacks include the feeding of compromised boot code to the CPU, impersonations of the CPU to the TPM, the suppression and injection of false measurements to a legitimate TPM, and the redirection of legitimate measurements to an attacker controlled TPM.
Also Read: Data Protection Trends Businesses Need to Know in 2023
“With the formation of this Work Group, a TPM will be empowered to protect the resources and communication of a CPU to which it is bound with precise, given measurements”, said Co-Chair of the Data Center Work Group, Dennis Mattoon. “The TPM will also be able to prove the measurements and the correct CPU instance of a given object to a verifier. We look forward to developing our plans to continue establishing trusted computing within data centers”.
Dennis Mattoon and Jeff Andersen have been confirmed as the Co-Chairs of the Work Group. Mattoon is a Principal Software Development Engineer for Microsoft Research, and Co-Chairs the Attestation, Supply Chain Security, DICE, and Marketing Work Groups at TCG. Andersen is a Staff Software Engineer at Google and became a member of the TCG in 2021.
“We’re delighted to publicly announce the formation of the new Work Group”, said Co-Chair Jeff Andersen. “Current data center hardware designs make it difficult for CPUs to be permanently bonded with the TPM, creating a gap for malicious entities to exploit. Our goal is to overcome the interposers operating within this area and mitigate the significant threats they can bring to data centers”.
The Work Group will also look at protecting the data center against hackers looking to clear platform configuration registers (PCRs) in the legitimate TPM by falsely asserting that the CPU has reset. As a result, operators will be able to trust that the components and hardware found within the system are operating successfully without the fear it may become weaponized by an attacker.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.