[Teep] TEE/TPM adoption

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Fri, 05 January 2024 13:43 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21C8BC05DDD6; Fri, 5 Jan 2024 05:43:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4nYiQedtpv9k; Fri, 5 Jan 2024 05:43:44 -0800 (PST)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36E83C14F617; Fri, 5 Jan 2024 05:43:39 -0800 (PST)
Received: by mail-lj1-x234.google.com with SMTP id 38308e7fff4ca-2cd17a979bcso19277041fa.0; Fri, 05 Jan 2024 05:43:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704462216; x=1705067016; darn=ietf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=kj5h2XdrfV7PJ0JZDSnNiTAtssHVnBqNUtwQHwm01H0=; b=Rzl481vhoGgKA1RwLGUjmrlJbrCWp0Qlh5rXIpYwYG65PNzNtC4fUY6L6kUbxJGZwK t2Y99A7jbn+LbDufVeUu9q2x/BqvNT6aZrvgSVeozYdNn74YyMKd+chigsVlgrs9eiIp nwn25z2FNd+JDdOTc88m1qLFhfHI763iP+K+ZV012eDGVBgPFoYr1Bq2l8QGLhDOl4N9 cQWwFkFm0oCS35ygocRFXM3T+QapshLLd2hsURk+Q+09byBQJitR/BU43KnybBZ+4Lel +QdgRc8f3zJJ5rKMil+InKBWrWWfX2T1UcFA4rJRoF2Zcued5tXsTPmjsuHSalRx8w1Q /DQQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704462216; x=1705067016; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=kj5h2XdrfV7PJ0JZDSnNiTAtssHVnBqNUtwQHwm01H0=; b=pNbd4bsM5YJBtAE3j85nogUIcp8upIvsWn3aTWSwpFLjF3Z07PtPQ2lwdgWm5EXr3y a0/Onrrqmj2Ok6gw75dYRx36WvgRceklMajfBkOF5R92kHOb/Ez7bwwcMZ1CJHcKZcgw qOBHnpVskc9TvTqCxnXSAIq3G8iBDW2kYUyTKI14NPBfyBW8/DqXocItnSClbmLeqvo2 Li15bemTfibBez/vt7Ix5AexP+FMzN5R9TcjW2sU66ZcrOq1oba0+iQ/Up05MWTxrnTp YSR+0UYubBq/d/a4Ii4BSsNRGRn/j07n4kJUMphNxAiHRyrgTNc2tLap7NKouqqQmXWm fYmA==
X-Gm-Message-State: AOJu0YxYt0y6W6mXjsmOpPPnaJnmUK18Ask6zteaGDVp8ZK83TIf5oCZ S/bkI2LGFXPQSxhRnanPb8UrC091mltT8iE1s9e4kCF2Mxo=
X-Google-Smtp-Source: AGHT+IFrESkeQcX+dCq51IdpIWkjSdFfyXtydTYmMhGharEfHn2M23PpcTizEw0IPmTZyqiBZAL1+pb+1DoO62a+bVI=
X-Received: by 2002:a2e:331a:0:b0:2cd:122a:7ede with SMTP id d26-20020a2e331a000000b002cd122a7edemr584588ljc.164.1704462216246; Fri, 05 Jan 2024 05:43:36 -0800 (PST)
MIME-Version: 1.0
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Fri, 05 Jan 2024 08:42:59 -0500
Message-ID: <CAHbuEH4gHx7mmZUmS9CagbSH0zbzH6NqyW9_szDswnmqB2=Yig@mail.gmail.com>
To: rats <rats@ietf.org>, teep <teep@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000eebad8060e330829"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/NEBweELSxn7_Hhx2VDkTK-ymvIY>
Subject: [Teep] TEE/TPM adoption
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jan 2024 13:43:48 -0000

Greetings!

My team from CIS did market research to determine support levels of TPM and
TEEs in various types of equipment over the past year+. I left CIS at the
end of the year and this was just posted a few days into this year. The
purpose of this work was to spur on adoption of attestation work, and any
related work that uses these components by developers. It was intended as a
signal to begin using them if developers have not done so already. The
categories of hardware for server and storage were very strong in terms of
adoption and deployment. Hyperscalers have pockets where it is fully
available and growing. The client market will continue to improve in the
next few years due to changes in chips.

We hope this is helpful. Here is the link and the paper can be downloaded
without needing to enter an email address.

https://www.cisecurity.org/insights/white-papers/built-in-security-at-scale-through-hardware-support

-- 

Best regards,
Kathleen