Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Security Threat ScenarioTPM KeyController Key

Key from TPM + Controller

 TPM + Controller Key with Attestation

Storage drive is taken out and inserted into another system/PC to read the data from the SSD directly using offline crypto tools

ProtectedProtected  Protected ProtectedProtected
Storage drive is taken out and inserted into another system/PC to read the data, by spoofing the Device Identity and talking to ControllerProtectedNot ProtectedProtectedProtected
EVE device is taken out, and booted up in another location to access its data, but the theft has been detected Not ProtectedProtectedProtected

Protected


EVE device is taken out, and booted up in another location to access its data, but no knowledge of it being stolen Not ProtectedNot ProtectedNot ProtectedProtected (Using Geo Fencing)
EVE device is not taken out, but some other malware is loaded on the system, and is used to get access from remote to access the informationNot ProtectedNot ProtectedNot ProtectedProtected (Given that malware is detected by PCR values)


References

  1. https://wiki.lfedge.org/display/EVE/Encrypting+Sensitive+Information+at+Rest+at+the+Edge
  2. The pull request corresponding to this proposal: https://github.com/lf-edge/eve/pull/186

...