Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Security Threats Addressed

Security Threat ScenarioTPM KeyController Key

Key from TPM

and

+ Controller

 Controller
 TPM + Controller Key with Attestation

Storage drive is taken out and inserted into another system/PC to read the data from the SSD directly using offline crypto tools

ProtectedProtected ProtectedProtected
Storage drive is taken out and inserted into another system/PC to read the data, by spoofing the Device Identity and talking to ControllerProtectedNot ProtectedProtectedProtected
EVE device is taken out, and booted up in another location to access its data, but the theft has been detected Not ProtectedProtectedProtected

Protected


EVE device is taken out, and booted up in another location to access its data, but no knowledge of it being stolen Not ProtectedNot ProtectedNot ProtectedProtected
EVE device is not taken out, but some other malware is loaded on the system, and is used to get access from remote to access the informationNot ProtectedNot ProtectedNot ProtectedProtected


References

  1. https://wiki.lfedge.org/display/EVE/Encrypting+Sensitive+Information+at+Rest+at+the+Edge
  2. The pull request corresponding to this proposal: https://github.com/lf-edge/eve/pull/186

...