Intel Trusted Execution Technology for Server Platforms

A Guide to More Secure Datacenters

by William Futral, James Greene

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.

"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!" - John McAuley, EMC Corporation

"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud." - Alex Rodriguez, Expedient Data Centers

"This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk." - Pete Nicoletti. Virtustream Inc.

This open book is licensed under a Creative Commons License (CC BY-NC-ND). You can download Intel Trusted Execution Technology for Server Platforms ebook for free in PDF format (4.8 MB).

Table of Contents

Chapter 1
Introduction to Trust and Intel Trusted Execution Technology
1
Chapter 2
Fundamental Principles of Intel TXT
15
Chapter 3
Getting It to Work: Provisioning Intel TXT
37
Chapter 4
Foundation for Control: Establishing Launch Control Policy
61
Chapter 5
Raising Visibility for Trust: The Role of Attestation
79
Chapter 6
Trusted Computing: Opportunities in Software
89
Chapter 7
Creating a More Secure Datacenter and Cloud
105
Chapter 8
The Future of Trusted Computing
119

Book Details

Subject
Computer Science
Publisher
Apress
Published
2013
Pages
149
Edition
1
Language
English
ISBN13
9781430261483
ISBN10
143026148X
ISBN13 Digital
9781430261490
ISBN10 Digital
1430261498
PDF Size
4.8 MB
License
CC BY-NC-ND

Related Books

Agile Development for Serverless Platforms
You need more than great dev tools to release great software; you need an efficient pipeline that takes advantage of modern Agile development practices. Serverless platforms like AWS offer the basic building blocks you need to run code, store data, or process streaming information so you can focus on the features you want to provide, not get bogged...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Innovative Medicine
This book is devoted to innovative medicine, comprising the proceedings of the Uehara Memorial Foundation Symposium 2014. It remains extremely rare for the findings of basic research to be developed into clinical applications, and it takes a long time for the process to be achieved. The task of advancing the development of basic research into clini...
Innovation, Economic Development, and Intellectual Property in India and China
This book analyses intellectual property and innovation governance in the development of six key industries in India and China. These industries are reflective of the innovation and economic development of the two economies, or of vital importance to them: the IT Industry, the film industry, the pharmaceutical industry, plant varieties and food sec...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-s...