Root of Trust (RoT)
A cryptographic module embedded inside within a computer system that can endorse trusted execution and attest to the boot settings and metrics
It scans the boot metrics and OS files to verify their signature, which we can then use to sign a digital report
Trusted Platform Module (TPM)
A specification for hardware-based storage of digital certificates, keys, hashed passwords and other user and platform identification information
Hardware Security Module (HSM)
An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software-based storage
Anti-Tamper
Methods that make it difficult for an attacker to alter unauthorized execution of software
Can be enforced using Field Programmable Gate Array (FPGA) or a Physically Unclonable Function (PUF)
These mechanisms zero out the cryptographic keys which in turn deletes the data on the system if any tampering is detected
Key Management System
Integrated approach for generating, distributing and managing cryptographic keys for devices and applications