"Trusted Computing Technology Best Practices White Paper" was released, and Dragon Lizard helps promote the application and promotion of trusted computing technology (downloadable)

Trusted computing technology has become one of the key technologies to enhance the endogenous security capabilities of information systems. However, the application and promotion of trusted computing technology faces the dilemma of high learning costs and poor customer perception. Based on this, the Dragon Lizard Community has compiled and summarized the trustworthy computing SIG technology and cases, and selected the best content to form the "Dragon Lizard Community - Trusted Computing Technology Best Practices White Paper" (hereinafter referred to as the "White Paper"). It was released at the 2023 Yunqi Conference Dragon Lizard Operating System Special Session to help promote the application and promotion of trusted computing technology. This white paper comprehensively introduces the ecology and latest developments of trusted computing technology from the dimensions of standardization, community, technology, and cases, and contributes to the implementation of trusted computing technology.

 

At the conference, Wu Baoxi, Owner of the Trusted Computing SIG of the Dragon Lizard Community and OS security expert of Inspur Information, interpreted the "White Paper on Best Practices of the Trusted Computing Technology of the Dragon Lizard Community" and introduced the background, vision and development of the Trusted Computing SIG. recent goals. They pointed out that the key to the current application and promotion of trusted technology is how to realize unified and easy-to-use trusted basic software based on the open source community to link upstream and downstream ecosystems and to explore user-perceivable trusted computing solutions. At the same time, in the domestic context, the full-stack state-secret trusted computing solution needs to be improved urgently.

 

Content overview

The "White Paper" was carefully compiled over several months to help customers and ecosystem partners deepen their understanding of trusted computing technology and reduce the cost of learning trusted computing. It is divided into four major chapters. Please see the download method at the end of the article.

 

main content

The "White Paper" covers the basic knowledge of trusted computing, standardization progress, Practical Guide to the Dragon Lizard Operating System and best practices for trusted computing.

 

01 Basic knowledge of trusted computing

The application and development status of trusted computing technology, key technologies and terminology of trusted computing, and the current challenges and future trends of trusted computing technology help readers quickly understand the basic knowledge and cutting-edge trends of trusted computing technology.

02 Trusted Computing Standard

Standards are a symbol of mature industrial application of technology and a guarantee for widespread application of technology. After more than 20 years of exploration and development, trusted computing technology has formed a mature standard system. It mainly introduces the international trusted computing standard system represented by TCG and the domestic trusted computing standard system to help users quickly understand the latest trends in trusted computing standardization.

03 Dragon Lizard Operating System Trusted Computing Practical Guide

It mainly introduces the trusted basic software components of the Dragon Lizard operating system (simulated trusted root, trusted software stack, trusted tool set, trusted enhancement services, etc.) and applicable guides to help users understand how to better use these trusted basic components. Achieve safety goals.

04 Trusted Computing Best Practices and Solutions

Trusted computing technology is a system-level security enhancement technology, such as system trust verification, system full-disk encryption enhancement, trusted cluster construction, etc., and when properly applied, it can greatly improve the security capabilities of the operating system. It mainly selects content such as trusted computing solutions based on the processor's built-in trusted root service, practical exploration of lightweight trusted cluster construction based on keylime, and best practices for full-disk encryption security enhancement based on trusted roots to help users quickly understand Trustworthy computing security value.

future outlook

In the future, Inspur Information Dragon Lizard Joint Laboratory will work closely with ecological partners to continue to optimize the trusted basic software capabilities of the server operating system, and is committed to exploring easier-to-use and more efficient trusted computing solutions, so stay tuned!

How to download the white paper:

1. Welcome to follow the official account of the Dragon Lizard Community [OpenAnolis Dragon Lizard]. Reply with the keyword "White Paper" in the background to get the download link for the Dragon Lizard Community series white paper.

2. Download link: https://openanolis.cn/assets/static/TrustedComputing.pdf

-- over --

Guess you like

Origin blog.csdn.net/weixin_60347558/article/details/134262038