Abstract
The Trusted Computing Group (TCG) has created specifications for trusted computing, with a focus on ease of use, transparency, robust security functions in hardware, integration into the computing infrastructure, and inexpensive; including Self-Encrypting Drives (SED). TCG technologies will be described, including application to the design of trusted storage.
Learning Objectives
Overview of the security challenges facing storage
Business and compliance motivations for applying trusted computing to storage, including breach notification legislation
Introduction to the technical specifications of the Trusted Computing Group, especially as they apply to storage
Technical details of Self-Encrypting Drives (SED)