ABSTRACT

This chapter aims to better define a specific area that encompasses hardware roots of trust and the technologies now available server side. It addresses a core area of concern of information security in the cloud, ensuring that low-level compromises to the hardware on unified extensible firmware interface (UEFI) and basic input and output system (BIOS) via low-level root kits become visible to system administrators. The Trusted Computing Group (TCG) is an organization that is working to standardize hardware-based root of trust. The chapter provides the presentation at the NITB conference in Amsterdam of a live BIOS exploit tool, which will allow command and control of the system on which it will be deployed. It aims to only briefly touch on each of them to explain in general terms what each stands for. The chapter defines how this trusted platform module can be used to help secure servers and build trusted server workloads.