![]() NitroTPM leverages the isolation and security properties of the Nitro System to ensure only the instance can access these secrets. You can use NitroTPM to store secrets, such as disk encryption keys or SSH keys, outside of the EC2 instance memory, protecting them from applications running on the instance. I am happy to announce you can start to use both NitroTPM and Secure Boot today in all AWS Regions outside of China, including the AWS GovCloud (US) Regions. We also announced Unified Extensible Firmware Interface (UEFI) Secure Boot availability for EC2. And third, it may help to ensure platform integrity by taking and storing security measurements.ĭuring re:Invent 2021, we announced the future availability of NitroTPM, a virtual TPM 2.0-compliant TPM module for your Amazon Elastic Compute Cloud (Amazon EC2) instances, based on AWS Nitro System. Second, you can use a TPM module to perform platform device authentication by using the TPM’s unique RSA key, which is burned into it. First, you can generate, store, and control access to encryption keys outside of the operating system. There are three key advantages of using TPM technology. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. In computing, Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |