OpenStack security leaders have detailed the capabilities and best practices for security, compliance and privacy.     Learn More

Using TPMs for the benefit of the entire cloud

Many cloud deployments include hardware with a Trusted Platform Module (or TPM), but in most cases this is entirely unused. Support for using the TPM to provide remote attestation has been merged into OpenStack in the form of Trusted Compute Pools, allowing admins to configure clouds to detect systems that have booted untrusted code and block guests from being scheduled on them. But, while important, protecting against the initial booting of untrusted code isn't the only thing TPMs can be used for - or, perhaps, not even the most interesting. Clouds need a good source of random numbers. Clouds need to be able to store secrets securely. And clouds need to provide guarantees that having someone wander off with one disk from a RAID array isn't obtaining sensitive customer data in the process. This presentation will cover mechanisms for using a TPM to provide additional security for the whole cloud. It will describe integration of TPMs with disk encryption, allowing for improved security of user data. It will explain integration of TPMs with Barbican, allowing for Hardware Security Module-like functionality without additional hardware cost. And it will discuss how TPMs can be used as either the primary source of entropy for clouds or as a mechanism for reducing the impact of a trusted but backdoored random number generator. 

Speakers: Matthew Garrett