TCG Trusted Network Connect TNC Architecture For Interoperability
TCG Trusted Network Connect TNC Architecture For Interoperability
TCG Trusted Network Connect TNC Architecture For Interoperability
TCG
TCG PUBLISHED
Copyright TCG 2004-2009
Copyright 2004-2009 Trusted Computing Group, Incorporated. Disclaimers, Notices, and License Terms THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. This document is copyrighted by Trusted Computing Group (TCG), and no license, express or implied, is granted herein other than as follows: You may not copy or reproduce the document or distribute it to others without written permission from TCG, except that you may freely do so for the purposes of (a) examining or implementing TCG specifications or (b) developing, testing, or promoting information technology standards and best practices, so long as you distribute the document with these disclaimers, notices, and license terms. Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owner.
Trust Credentials
IF-IMV
IF-PTS
IF-TNCCS
IF-M
IF-T
Infrastructure Architecture:
IF-PEP
IF-MAP
FTNC
CESP
Acknowledgement
The TCG wishes to thank all those who contributed to this specification. This document builds on work done in the various working groups in the TCG. Special thanks to the members of the TNC contributing to this document: Scott Kelly Amit Agarwal Mahalingam Mani Jeffery Dion Steven Venema Peter Wrobel Mark Townsend Michael McDaniels Hidenobu Ito Seigo Kotani Houcheng Lee Sung Lee Graeme Proudler Mauricio Sanchez Ren Lanfang Jiwei Wei Han Yin Diana Arroyo Guha Prasad Venkataraman Sean Convery Chris Hessing Morteza Ansari Stuart Bailey Ivan Pulleyn Ravi Sahita Ned Smith Josh Howlett Yan Avlasov Roger Chickering Charles Goldberg Steve Hanna (Editor, TNC cochair) PJ Kirner Lisa Lorenzin (Editor) John Jerrim Tom Price Matt Webster Ryan Hurst Sandilya Garimella Meenakshi Kaushik Paul Sangster (TNC co-chair) Brad Upson Lauren Giroux Chris Salter Aruba Networks Avaya Avaya Boeing Boeing CESG Enterasys Extreme Networks Fujitsu Limited Fujitsu Limited Fujitsu Limited Fujitsu Limited Hewlett-Packard Hewlett-Packard Huawei Technologies Huawei Technologies Huawei Technologies IBM IBM Identity Engines Identity Engines Infoblox Infoblox Infoblox Intel Corporation Intel Corporation JANET (UK) Juniper Networks Juniper Networks Juniper Networks Juniper Networks Juniper Networks Juniper Networks Lancope Lumeta Lumeta Microsoft Motorola Nortel Symantec Corporation UNH InterOperability Lab US National Security Agency US National Security Agency
4
4.1 4.2
5
5.1 5.2 5.3 5.4 5.5
7.2 Message transport technologies .................................................................................................... 36 7.2.1 Protected EAP Methods ........................................................................................................ 36 7.2.2 TLS and HTTPS .................................................................................................................... 36 7.3 PDP technologies........................................................................................................................... 36 7.3.1 RADIUS ................................................................................................................................. 37 7.3.2 Diameter ................................................................................................................................ 37
8 9 10 11
Security Considerations ...................................................................................... 38 Privacy Considerations ....................................................................................... 40 References ............................................................................................................ 41 TNC Glossary ....................................................................................................... 43
2 Introduction
The TNC architecture focuses on interoperability of network access control solutions and on the use of trusted computing as the basis for enhancing security of those solutions. Integrity measurements are used as evidence of the security posture of the endpoint so access control solutions can evaluate the endpoint's suitability for being given access to the network. The purpose of the current document is to define the Trusted Network Connect (TNC) architecture for interoperable network access control and authorization. The TNC architecture will leverage and integrate with existing network access control mechanisms such as 802.1X [19] or others. The TNC specifications will also define interoperability interfaces to allow for the exchange of new types of attributes in the context of network access control solutions. Those attributes will include endpoint compliance information, software state attestation, as well as information pertaining to the Platform-Authentication exchange [2]. Note that in the remainder of this document, the term Platform-Authentication carries the specific TCG meaning of performing verification of the integrity status of a platform using the features of Trusted Platforms [1]. These features represent the core functionality of trusted computing as defined and specified by the TCG. 1 The term Platform-Authentication as used in the context of TNC pertains to two related aspects of authentication. The first aspect is the proof of identity of the platform (or Platform Credential Authentication), while the second aspect is the integrity verification (or Integrity Check Handshake) of the platform. In the specific context of the TCG, proving the identity of a platform is performed using any non-migratable key (e.g., an AIK). Since there are an unlimited number of non-migratable keys associated with a TPM there are an unlimited number of identities that can be deployed to effect privacy of the user on the platform. Note that claimed identity in a platform may or may not be related to the user or any actions performed by the user (see [3]). In the remainder of this document, the term Platform-Authentication therefore should generally be understood as consisting of both aspects, namely establishing proof of identity (e.g. via AIKcertificates) and platform integrity verification.
Since the term Platform Authentication carries a distinct TCG meaning, the two words are hyphenated (platform-authentication) in the current document to differentiate it from the more general meaning of authentication/authorization of a general computing platform.
The goal of Trusted Computing as defined by the Trusted Computing Group (TCG) is to improve trustworthy behavior of platforms and to permit trustworthy verification. Verifiers have the ability to decide when it is safe to extend the enterprise boundary to a connecting platform based on the integrity information reported by the platform and by the proof-of-identity supplied by the platform. Through trusted network connection protocols and trusted platform mechanisms, elements seeking connectivity can be platform-authenticated and authorized (against some network policy) before being given full network connectivity. More specifically, in the context of endpoint authentication and authorization the aim is to ascertain the security state of a given platform or device. A strong hardware-protected root-of-trust is needed to ensure malware and improperly configured software cannot report an erroneous status. One important goal of the TNC architecture is to use the TCG Platform-Authentication approach as a critical part of achieving true trusted network connections. The model adopted is a 3-party model in which an Access Requester requests network access to a Policy Decision Point which in-turn provides its validation outcome (access granted/denied) to a Policy Enforcement Point (e.g. switch, 802.11 AP). The term policy in the current document refers to network-access control policies or rules, which in the case of the TNC should include rules concerning both the integrity aspects of the platform as well as the identity aspects of the platform.
The TNC architecture and specifications will ensure that hosts are interoperable. That is, hosts that implement the protocols, software and/or hardware will be able to connect to a network while ensuring a minimum level of compliance to organizational policies controlling network access. Policies may apply to the security posture of the platform and may include services such as antivirus scanners, personal firewalls, intrusion detection systems, operating system configuration, and application patch levels. The goal of enforcing these policies is to prevent compromise of the host, the network, or other network resources.
In the IWG architecture when responding to a request from a Requestor element, a Relying Party is dependent on the decision outcome of a Verifier. This basic behavior maps quite readily to the basic network connection request behavior, in which a network capable device (e.g. a client or 802.1X Supplicant) seeks network connectivity and access to resources available on the network,
through another device (e.g. 802.1X Authenticator, switch) relying on the permissions decision of a third device (e.g. AAA Server) [19]. In the TNC architecture, the AR acts as an IWG Requestor, the TNC PDP acts as an IWG Verifier, and the TNC PEP acts as an IWG Relying Party. In the context of the TNC architecture, the Requestor is more specifically referred to as the Access Requestor (AR), which is the element that is seeking network connectivity to a given network. The Verifier is referred to as the Policy Decision Point (PDP), since that element makes the actual decision (access granted fully, access granted partially, or access denied) with respect to the corresponding request. The PDP performs this decision-making based on a set of policies (customized for the network environment) and based on input from various sources of integrity information. The element that actually carries out the PDPs decision (e.g. open/close port in 802.1X) is referred to as the Policy Enforcement Point (PEP) [18]. Though not visible in Figure 1, another important aspect shared between the two architectures is the use of the trusted computing feature of integrity measurement and integrity verification to establish a decision regarding a network access request. It is this hardware-rooted feature that distinguishes the IWG and TNC architectures from other architectures.
Point (MAP), and the MAP Client. Within each role (column), the boxes depict the functions within those roles. Three horizontal shaded layers are depicted grouping the functoins, while the interfaces that will be standardized by the TNC are depicted by named lines. These layers, roles, functions, and interfaces are described below.
Figure 2: The TNC Architecture It is important to note that Figure 2 shows the functions (of each role) that pertain to integrity verification and network security established through interfaces defined as part of the work-scope of the TNC. The TNC Architecture does not preclude other components that implement other functions pertaining to network access control, and networking and security in general. For example, the Network Access Authority (NAA) could be implemented as just an additional component within a RADIUS Server within a given 802.1X usage, with the RADIUS Server also obtaining other policy-related information from other sources (e.g. other servers). As such, it is important for the reader to understand that the functions of each role in the TNC Architecture are not the only components implementing security and network connection management. Additionally, a single physical element in a network environment may play more than one role in the TNC Architecture. For example, a switch or wireless access point configured to authenticate endpoints with 802.1X supplicants via 802.1X, but assign a default access policy (e.g. guest VLAN) to non-supplicant endpoints, fulfills the role of both the PEP and PDP; such a network device is referred to as a combined PEP/PDP. Another example is a policy server that both provisions access control policy to a PEP and subscribes to information from a MAP; that policy server is both a PDP and a MAPC.
3.4 Roles
The required roles within the TNC Architecture are the Access Requestor (AR) and the Policy Decision Point (PDP). The optional roles are the Policy Enforcement Point (PEP), the Metadata Access Point (MAP), and the MAP Client (MAPC). All roles and functions in the architecture are logical ones, not physical ones. The element performing a particular role or component providing a particular function may be a single software program, a hardware machine, or a redundant and replicated set of machines spread across a network, as appropriate for its function and for the deployments needs.
Policy Decision Point (PDP): The role of the PDP is to perform the decision-making regarding the ARs network access request, in light of the access policies.
3.5 Layers
Three (3) abstract layers of the architecture are identified, grouping components providing similar functions: The network access layer: These are the components whose main function pertains to traditional network connectivity and security. They may support a variety of networking technologies (e.g. VPN, 802.1X). The functions found in this layer are the Network Access Requestor (NAR), the Network Access Enforcer (NAE) and the Network Access Authority (NAA). The integrity evaluation layer: The function of the components in this layer is to evaluate the overall integrity of the Access Requestor with respect to certain access policies, with input from the functions at the integrity measurement layer. The functions found in this layer are the TNC Client (TNCC) and the TNC Server (TNCS). The integrity measurement layer: This layer contains plug-in components whose function is to collect and verify integrity-related information for a variety of security applications on the Access Requestor. The functions found in this layer are the Integrity Measurement Collectors (IMCs) and the Integrity Measurement Verifiers (IMVs).
3.6 Functions
Referring to Figure 2, the functions making up the roles are as follows.
Integrity Measurement Collector (IMC): The IMC function is a software component that runs on an AR, measuring security aspects of the AR's integrity. Examples include the Anti-Virus parameters on the Access Requestor, Personal Firewall status, software versions, and other security aspects of the AR. Note that the TNC Architecture is designed for multiple IMCs to interact with a single (or multiple) TNC Client/TNC Server, thereby allowing customers to deploy complex integrity policies involving a range of vendors products.
network activities being monitored include accessing particular services in a network, authentication activity, broadcast requests for various services (e.g. DHCP), and advertising of services.
Flow 0:
Prior to beginning a network connection and Integrity Check Handshake attempt, the TNCC must discover and load each relevant IMC using the platform-specific binding. The TNCC must then initialize the IMC, which includes defining the necessary connection IDs and IMC IDs, and ensuring that the TNCC has a valid connection state with the IMC. During the load process, the TNCC may check the integrity of the IMCs. This is optional. If a TPM is present, this check will typically involve hashing the IMCs and adding their hashes to a PCR (i.e. performing one or more TPM Extend operations). If no TPM is present, this check may involve checking the signatures on the IMCs. Integrity checks during IMC loading are done completely by the TNCC since there is no TNCS or IMV available. TNCS and IMVs will get a chance to do platform authentication of the endpoint platform later in the sequence of events. Similarly, the TNCS must discover and load each relevant IMV using the platform-specific binding.
Flow 1:
When a network connection attempt is triggered (automatically or by user request), the NAR at the AR (client) initiates a connection request at the link and network layers. Upon receiving a network connection request (from the NAR), the NAE sends a network access decision request to the NAA. Here, the NAA is assumed to have been configured to perform User Authentication, Platform Credential Authentication and Integrity Check Handshake. User authentication can occur between the NAA and the AR. Platform Credential Authentication and Integrity Check Handshake may have occurred between the AR and the TNCS. Note that since an ordering of authentication has been configured, failure in one authentication will discontinue other forms of authentication and integrity check. That is, if the user fails user authentication with the NAA, then Platform Credential Authentication and Integrity Check Handshake will not proceed.
Flow 2:
Flow 3: Flow 4:
Assuming that User Authentication succeeded between the user (on the AR) and the NAA, the NAA then informs the TNCS of the connection request. The TNCS then performs (mutual) Platform Credential Authentication with the TNCC, verifying, for example, that valid (un-revoked) AIK-credentials are used by both endpoints. Assuming that Platform Credential Authentication succeeds between the TNCS and TNCC, the TNCS indicates to the IMVs (using interface IF-IMV) that a new connection request has occurred and that an Integrity Check Handshake needs to be carried out by the TNCS. Similarly, the TNCC indicates to the IMCs (using interface IF-IMC) that a new connection request has occurred and that an Integrity Check Handshake needs to be carried out by the TNCC. The IMCs respond by giving a number of IMC-IMV messages to TNCC across IF-IMC.
Flow 5:
Flow 6A: In order for an Integrity Check Handshake to occur, the TNCS and TNCC begin the exchange of messages pertaining to the integrity check. These messages will be relayed through the NAR, NAE and NAA, and will continue until the TNCS is satisfied with the integrity status of the AR. Flow 6A shows this as a peer connection between the TNCS and TNCC. Flow 6B: The TNCS passes each IMC message to the matching IMV or IMVs through IF-IMV (using message types associated with the IMC messages to find the right IMV). Each IMV analyzes the IMC messages. If an IMV needs to exchange more messages (including remediation instructions) with an IMC, it provides a message to the TNCS through IF-IMV. If an IMV is ready to decide on an IMV Action Recommendation and IMV Evaluation Result, it gives these to the TNCS through IF-IMV.
Flow 6C: Similarly, the TNCC will forward messages from the TNCS to the matching IMC or IMCs through IF-IMC, and send messages from the IMCs to the TNCS. Flow 7: When the TNCS has completed its Integrity Check Handshake with the TNCC, it then sends its TNCS Action Recommendation to the NAA. Note that the NAA may still have the option of not granting network access if other security policy requirements have not been met by the AR (even though the AR has passed the Integrity Check). The NAA then sends its network access decision to the NAE to enforce. The NAA must also indicate its final decision to the TNCS which will be sent to the
Flow 8:
TNCC. Typically, the NAE indicates its execution of the decision (e.g. Port open in 802.1X) to the NAR. The above represents the basic behavior of elements in the architecture (assuming a successful connection request, without remediation). Each specific deployment of the architecture will have its own unique policy configuration and network topology aspects that will dictate how additional steps may occur.
IMC-to-IMV message delivery: One key function of the TNCC and TNCS is to provide message delivery transportation between an IMC and an IMV. The TNCC and TNCS are not required to understand the semantics of the information communicated by the IMC-IMV pair. Each message consists of a body, type and intended recipient type. The TNCC and TNCS use the message type information and recipient type to route and deliver messages to the appropriate destination IMC or IMV. Note that to the IMC and IMV, messaging is achieved using interface IF-IMC and IF-IMV. As such, an IMC actually performs a function-call (instead of explicitly sending message). The appropriate SendMessage and ReceiveMessage set of APIs are defined as part of the IFIMC and IF-IMV specifications. The RequestHandshakeRetry API may be used by IMCs or IMVs to originate an Integrity Check Handshake retry, enabling IMC-IMV messaging. The IMC may specify the connectionID (or wildcard for all available connections) identifying IMVs/TNCSs that should receive the message. TNCS implementers should be aware that the TNCC may gather all the messages that IMCs want to send before sending off the messages for that round. Once all IMCs have finished sending their messages for a round, the TNCC will send those messages to the TNCS and await its response.
Number of message rounds and underlying transport: Since the current TNC Architecture seeks to be applicable to a broad range of network transport mechanisms (e.g. Dial-up PPP, EAP/802, VPNs, etc), the issue of minimizing message rounds used by an IMC-IMV pair becomes an important aspect. In order to accommodate a broad range of use scenarios, the current architecture defines a number of basic messaging behaviors, realized through a number of message-related functions in interface IF-IMC. These include a function used by a TNCC to indicate to IMCs that an Integrity Check Handshake is beginning, a function for an IMC to respond to this initiation, and a return function when the IMC has sent all the messages. Note that messages can be delivered in one or more rounds. Note that the IF-IMC interface is defined to also allow the TNCCs and TNCSs to employ messaging mechanisms that are not based on rounds or flows. However, they must deploy a round-based messaging system over those protocols (the IMCs send messages, then the IMVs send messages, etc.).
Error handling: IF-TNCCS is responsible for communicating error messages between TNCC and TNCS. Error messages / codes are defined to ensure TNCCS protocol state is deterministic. Errors in other components (e.g. IMC/IMV) are to be addressed by the corresponding layer (e.g. IF-M). Therefore, an error in an IMV may result in an IMV/IMC protocol message, while the IF-TNCCS messaging may be successful.
network security policy requirements. The current TNC Architecture accommodates for such a case of multiple TNCCs per platform (AR). In this respect, the IF-IMC API defines the support for multiple TNCCs on a single AR. Furthermore, it supports multiple overlapping network connections and Integrity Check Handshakes for a single TNCC. Normally a single TNCC initiates the TNCCS session to the TNCS. The NAR knows ahead of time which TNCC should receive response messages from the TNCS on that session. However the NAA would need to be able to route the inbound messages to the appropriate TNCS should multiple be available. Currently the TNC messages do not include an indication of the desired end TNCS, so the NAA needs a mechanism for making this message delivery decision when multiple TNCS exist. NAA implementations SHOULD allow for policy to be specified at run-time to define which TNCS should receive particular message types. This policy might be done via a set of configuration setting or be dynamic as TNCC startup and register with the NAR. In the reverse direction, the TNCS currently doesn't initiate new sessions to the TNCC. However this likely will become necessary in order for the TNCS to re-verify the TNC endpoint is still in compliance with policy (e.g. when the network policy changes.) TNCC/NAR implementers are encouraged to support run-time policy enabling the NAR to make decisions about the destination TNCC when an inbound connection request from the NAA occurs. Platform-independence: Given the increasing heterogeneity of most networks today, the TNC Architecture anticipates the deployment of various devices and services within a network based on various platforms each of which will require endpoint integrity verifications. Support for connection state across remediation and handshake re-tries: When a new TNCCTNCS relationship is established, the TNCC and TNCS independently choose a network connection ID to refer to that relationship. The TNCC and TNCS inform the IMCs and IMVs of the new network connection and update them whenever the state of the network connection changes. When a network connection is complete, the TNCC and TNCS notify the IMCs and IMVs that the network connection ID will be deleted and then does so. The TNCC and TNCS are not required to maintain the network connection ID across multiple connection attempts, remediation and connection retries. In fact, it will be common for the TNCS to avoid maintaining such state but for the TNCC to maintain the state for some time. There are some benefits to maintaining the network connection ID. When an AR fails to pass all integrity verification requirements as defined by the network policy, the AR is typically redirected to a remediation facility or function (e.g. separate remediation LAN) in order for its IMCs to collect/update their integrity data (e.g. AV-signature data or software updates). If the TNCC connection state is maintained, each IMC can inform the TNCC using the connection ID of the completion of its updates. One potential benefit of maintaining the network connection ID at the TNCS is the possibility of the TNC Server informing all TNC Clients on the network of an update of the network access policies and updates to the IMVs. This will trigger the TNC Clients to update their own integrity data and to perform an Integrity Check Handshake retry based on their updated integrity data. Finally, maintaining a network connection ID on a TNCC or TNCS allows an IMC or IMV to request an Integrity Check Handshake retry in general (e.g. when the IMC or IMV detects that an attack on the client platform has been attempted since the last Integrity Check Handshake). Due to the variety of possible underlying network elements implementing the TNC Architecture, it may not be possible for a TNCC or TNCS to restart an Integrity Check Handshake when requested. The TNCC and TNCS must support a method for an IMC or IMV to request a handshake retry, but it is acceptable for the TNCC or TNCS to simply return an error code and not retry the handshake.
Support for multiple connections: The IF-IMV API must support multiple overlapping network connections and Integrity Check Handshakes for a single TNCS from multiple TNCCs, and communication between the TNCS and multiple IMVs. Similar requirements hold for IF-IMC. Support for recommending isolation: IF-IMV must have some mechanism for IMVs to recommend isolation and compliance information to the TNCS, so that isolation can properly be supported on the network. This may stop short of an explicit mechanism for knowing which network to assign for isolation, but there must be a way to pass intelligence from IMVs to the TNCS.
Integrity Measurement Integrity Measurement Provisioning & Collector Collector Remediation Applications
Integrity Measurement Integrity Measurement Provisioning & Verifiers Verifiers Remediation Resources
TNC Client
TNC Server
Policy Network Access Enforcement Point Enforcer Switch/ Firewall/ VPN Gateway
Remediation: Remediation is the process of the AR obtaining corrections to its current platform configuration and other policy-specific parameters in order to bring it inline with the PDPs requirements for network-access of the PDP.
the first since the IMCs may be able to send only the data that has changed (if supported by the IMVs).
There are two elements relevant to remediation in the TNC Architecture (see Figure 4): Provisioning & Remediation Applications (PRA): The Remediation Application can be implemented in several forms. For example, the PRA could be implemented as part of the Access Requestor (AR). Here, the PRA communicates with the IMC and provides it with specific types of integrity information. An example of an embodiment of the PRA would be the Anti-Virus application software that communicates with sources of AntiVirus parameters (e.g. latest AV signature files). Note that the PRA could be implemented as part of the IMC. As another example, the PRA/IMC could be an agent that updates the TPM and the TSS (part of the PTS), which obtains updates from the TPM Manufacturer. Provisioning & Remediation Resources (PRR): The PRR represents the various sources of integrity information needed to update the AR so that it can be successfully verified by the PDP at the next re-attempt of the handshake. Examples of the PRR include enterprise servers, vendor services (e.g. FTP server), CDs/DVDs containing the update parameters, and others.
In addition to the fundamental features of Trusted Platforms that are mentioned above, in the context of Platform-Authentication (see TCG Infrastructure Architecture specifications [2]), there are additional benefits that the TCG approach can provide:
Evaluation and Decision Making: Following the TCG authentication model in [1], when a requestor platform issues a request (e.g. to resources) to a relying party, that relying party needs to make a trust decision about the requesting systems platform. The TCG model allows the relying party to evaluate the integrity measurements discussed above during this decision. Some relying parties may wish to delegate this evaluation to a 3rd party and merely review the results when making the decision. The outcome of platform evaluation is not limited to binary results (such as success/fail), but may include ranges of values (e.g. 1 to 100) indicating the level confidence the evaluating platform has with regards to its assessment. Enforcement and Response: Depending on the exact configuration of an evaluating platform, the platform may in fact be a Policy Enforcement Point (PEP) for a given set of environmental-specific policies. In addition, the platform may return responses to another platform, of whom it evaluated.
These features play an important role when an AR seeks to obtain network access by reporting its integrity measurements to the PDP, which perform evaluation and decision-making regarding the access request, and which directs its evaluation results to the PEP for enforcement. In order for a TNC Client implementation to be able to make use of the TPM and its functionality, a separate layer of services called the Platform Trust Services has been introduced. This layer provides some level of abstraction in order for both the TNC Client and the IMC to query their underlying platform trust information within the AR on which they operate.
Integrity Measurement Integrity Measurement Provisioning & Collector Collector Remediation Applications
Integrity Measurement Integrity Measurement Provisioning & Verifiers Verifiers Remediation Resources
TNC Client
TNC Server
Network Access Policy Enforcer Enforcement Point Switch/ Firewall/ VPN Gateway
Figure 5: The TNC Architecture with the Trusted Platform Module (TPM)
6.2 Roles
The roles in TNC Architecture do not change with the introduction of trusted platforms (Figure 5). However, the concept of platform ownership and the owner role should be considered. The TNC architecture identifies the three roles of AR, PEP and PDP. In most, if not all cases, the PEP and PDP have the same owner. In other words, they are controlled by the same IT department or service provider. The AR may also have the same owner as PEP and PDP, but ownership should be re-validated before extending special privileges. Usually this is part of Platform-Authentication with a PDP. In the case where the AR and PEP/PDP owners are different, Platform-Authentication and remote attestation requires both parties to trust a common element called the Privacy Certificate Authority (Privacy-CA OR Platform-CA) who issues AIK-certificates to trusted platforms. In particular, the Privacy-CA is the element that seeks the ARs EK-certificate and in-turn issues an AIK-certificate for the ARs trusted platform. As such, when the AR uses the AIK-certificate within a Platform-Authentication event, the PDP as the verifier needs to trust the same Privacy-CA and accept the AIK-certificate issued by that Privacy-CA. The components, protocols and interfaces described below support interactions between these elements.
6.3 Functions
In addition to previously described TNC functions, the TNC architecture includes additional functions when a TCG trusted platform makes up the host environment. The additional functions are described here: Platform Trust Service (PTS): The PTS is a system service that exposes trusted platform capabilities to TNC components. PTS services include protected key storage, asymmetric cryptography, random numbers, platform identity, platform configuration reporting and integrity state tracking. The TCG Software Stack (TSS): The TSS [5] is a middleware stack that enables applications to use higher level interfaces for communication with the TPM support functions. These include unlimited key storage (off-chip protected), key caching and higher-level interface abstraction. The Trusted Platform Module (TPM): The TPM hardware component implements protected capabilities, shielded locations, and other functions as described above [4].
The PTS manages TPM finite resources including key storage, PCRs, measurement logs and transport sessions. It ensures processes and threads vying for access to these resources are serialized through appropriate process and thread locking mechanisms. Updates to the Integrity Measurement Log (IML) files are controlled such that log entries are synchronized with respect to PCR contents. An abstract representation of PCRs is exposed over IF-PTS to processes seeking to record and report integrity values. 6.3.1.2 Application Protocols The PTS participates in protocols that establish verifiable platform identities, PlatformAuthentication, and reporting of platform configuration state. The PTS is designed in such a way that it can be suitably deployed with tunneling protocols (e.g. within EAP), making use of Attestation Identity Keys (AIK) and key encryption keys (KEK). The PTS may possess privileges necessary to use AIKs and KEKs or to perform other TPM protected operations. Several protocols are anticipated to be supported by the TNC: Platform-Authentication using an AIK and other KEKs as needed. Platform attestation using TPM PCRs and Integrity Measurement Log entries. Platform identity registration of AIK using the TPM EK. Platform monitoring protocol for reporting the presence of the platform integrity agents
Other application protocols may be supported as determined by TNC requirements. 6.3.1.3 Trust Transitivity The PTS provides component loading and registration services that can be used to capture integrity state of TNC components before execution threads are passed. The PTS cooperates with platform trust capabilities, including the Roots of Trust for Measurement (RTM) to establish transitive trust linkages. The PTS may employ any available platform specific anti-spoofing and anti-tampering techniques as necessary to strengthen trust assurances. 6.3.1.4 Security Considerations for Network Connection with TPM Use of a TPM helps address a man-in-the-middle threat to the TNC Client and other components. TPM non-migratable and certified-migratable keys may be used to establish connections to PDP and PEP endpoints. Fixing the communications endpoint to hardware minimizes certain classes of MITM attacks (where a local redirector is involved). The TPM platform configuration registers can be used to more reliably capture and report platform configuration information thereby reducing the threat of rogue software on the client platform performing MITM redirection. The use of the TPM PCRs to validate the Integrity measurement Log prevents a system from lying about what the platform is running so others can determine if the endpoint has the desirable integrity. To close the vulnerability gap between the TPM and TNC components, a number of platform specific techniques may be employed. While it is not the goal of the TNC architecture to define specific techniques, it is an objective to define interfaces for TNC components to be integrity checked prior to their being relied upon by policy decision points.
The operating status and error condition of the PTS must be available to subscribers. The PTS may start and stop while subscribers remain operational. Individual service requests should be acknowledged by success or failure notifications. In case of no acknowledgement, a timeout or keep-alive mechanism should be employed to ensure deterministic interaction semantics.
Figure 6: The TNC Architecture within the TCG Integrity Management Model Although the TPM hardware itself provides a strong anchor of trust, another important dimension of trusted computing concerns the platform-state information that is being reported by the PTS in the AR to the PDP. That is, there is the aspect of how the platform-state information is being reported to (i.e. protocols, methods) and there is the aspect of what platform-state information is being reported. To that extent the TCG has developed an Integrity Management Model (IMM). Among others the purpose of the IMM is to define the lifecycle of platform-related information (e.g. component manufacturer, model, etc) and define how this information affects the levels of trust accorded to components within a platform and thus to the platform as a whole. The relationship of the TNC architecture and protocols within the TCG Integrity Management Model (IMM) is shown in Figure 6. Here, integrity management consists of five broad phases that are divided across two kinds of activities. The first set of activities Reference Measurement refers to the collection of (static) integrity information and data pertaining to components that make-up a platform. These measurements are likely to come from the manufacturer or developer
of the component so their customers can recognize a valid instance of the component at run-time. This set of activities can be considered to be out-of-band from the perspective of a given usecase, such as trusted network connections since they occur prior to the actual usage scenario that makes use of the integrity information. The second set of activities Runtime Measurement pertains to the actual use of the integrity information within a given Platform-Authentication event, in which the integrity of the components of the platform (e.g. AR) are measured and stored inside the Integrity Measurement Log (IML) of the platform and later used within a Platform-Authentication exchange, namely the TNC Integrity Check Handshake. The TNC architecture and protocols play a crucial role in IMM as it represents a PlatformAuthentication use-case (in the context of network access control) which makes use or consumes the integrity information collected and processed by the various phases of the IMM. More specifically, in Figure 6 the result of the runtime measurement of the AR platform is communicated to the PDP (as the Evaluator) as part of the network access request of the AR. The specific term used in this case is integrity report which represents the set of component integrity information about an AR which is communicated by the AR to the PDP within a PlatformAuthentication event. The PDP itself uses the policies inside the Policy Database (see Figure 6) pertaining to the AR as part of its decision-making regarding the AR. It is important to note that besides traditional information within the Policy Database (e.g. user ID, ACL, etc.) the Policy Database contains additional information pertaining to the components of the AR platform. More specifically, the Policy Database contains Reference Integrity Measurement Manifest (RIMM) records which denote the expected (good) reference value for each component of the AR platform. Using the RIMM information, the PDP is thus able to compare the reported component integrity information (in the Integrity Report communicated from the AR) against a good benchmark or reference value as found in the Policy Database. The RIMM information represents the end-product of the Reference Measurement phase. Among others, the RIMM contains integrity information from the manufacturer or vendor of the component which is source-authentic and which has been canonicalized according the TCG Core Integrity Scheme standard. The evaluator of a RIMM records will thus be able to verify the creator of the RIMM.
7.1.1 802.1X
The 802.1X standard [19] provides a framework for port based access control (PBAC) that is increasingly becoming accepted for LANs and WLANs. The TNC Architecture itself maps quite readily into an 802.1X framework as indeed the TNC Architecture was designed with great awareness of 802.1X and its increasing deployment today. Thus, for example, a Supplicant in 802.1X maps quite readily to an AR in this architecture. Here, the Supplicant that wishes port access at an Authenticator (e.g. 802.11 Access Point, Switch) will be authenticated by the Authentication Server (AS) based on the access policies defined in the AS. Integrity measurement and reporting can enhance an 802.1X deployment by providing the AS with additional data regarding the integrity status of the Supplicant. One possible embodiment would be the addition of TNC Client and a TNC Server to the Supplicant and AS respectively and the addition of the necessary methods to communicate integrity reporting between the two endpoints.
7.1.2 VPNs
Today, remote access based on VPNs have become a day-to-day necessity for many enterprises, with many VPNs established using the IKE protocol and the IPsec protocol. Using endpoint integrity reporting, one possible enhancement to IPsec VPNs would be for integrity information to be communicated as part and parcel of mutual authentication and key establishment. Thus, the IKE version-1 [22] key establishment protocol could be extended to include integrity reporting at the end of phase-1 after the IKE peers have authenticated. Recently the IETF has defined an internet draft for the next version of IKE [23] which includes support for carrying EAP-based messages for IKE peer (possibly also user) authentication. The TNC architecture could leverage this EAP transport to improve alignment with other EAP-based approaches described with the TNC architecture. Another breed of VPNs emerging recently is the SSL VPN, based on the SSL or TLS protocol. A number of vendors are already shipping products supporting SSL VPNs while some access service providers are offering SSL VPN services. Augmenting an SSL VPN offering with endpoint integrity can be achieved by enhancing the basic TLS exchange with the TLS-Attestation Extensions protocol which will deliver integrity measurement information between the SSL Client and Server. Such an enhancement would strengthen endpoint integrity verification, extending beyond the traditional SSL identity certificates and other authentication technologies.
7.1.3 PPP
The Point-to-Point (PPP) protocol is the standard method for transporting multi-protocol datagrams over point-to-point links, and is the basis for dial-up access to the Internet over the public PSTN today. From the security perspective, typically EAP is used over PPP to transport security-related parameters (see below).
7.3.1 RADIUS
The RADIUS protocol [21] has a long history dating to the early developments of dial-up (over PPP) and in many ISPs today RADIUS remains to be the primary standardized authentication protocol of choice. The TNC Architecture acknowledges the wide-spread deployment of RADIUS, and anticipates that rich and interesting combinations of RADIUS with other technologies (e.g. EAP) will ensure a development path forward for many implementers of RADIUS today. With the growing popularity of EAP as a way to allow various authentication methods to be used between the AR (i.e. client, EAP-Peer or Supplicant) and PDP (Authentication Server), extensions have thus been defined in RFC3579 for RADIUS itself to support EAP. The aim of the extensions is to use RADIUS to shuttle RADIUS-encapsulated EAP packets between the AR (or PEP in the TNC Architecture) and the PDP. Two new attributes that were introduced into RADIUS in RFC3579 to achieve this are the EAP-Message and Message-Authenticator attributes. Along these lines, one possible addition to RADIUS could be a new attribute to directly carry integrity measurement information. This would allow for further flexibility of RADIUS to address cases where EAP is not deployed above (inside) RADIUS.
7.3.2 Diameter
One of the aims of the development of the Diameter protocol (RFC3588) is to address some of the deficiencies of the RADIUS protocol, including transport reliability, capabilities negotiation and roaming support. Diameter employs attribute value pairs (AVPs) to carry various payloads relating to user authentication, service authorization, resource usage, and others. The use of AVPs allows the base protocol to be extended for use in new applications through the addition of new AVPs. In the context of the TNC Architecture, one possible extension could be AVPs to carry directly integrity measurement information from the AR to the PDP.
8 Security Considerations
The current architecture document focuses on aspects of endpoint integrity between an AR and the PDP, containing a TNC Client and TNC Server respectively. It also encompasses an optional MAP, which can interface the TNC Server with Sensors and Flow Controllers. There are a number of security aspects pertaining to the architecture as a whole which need to be highlighted, as these are relevant to implementations that seek to be conforming to the architecture and achieving security at the highest levels. These aspects are discussed in the following: Secure Channel between AR and PDP: In order to communicate integrity values and parameters between the TNC Client and the TNC Server, a secure channel must be established for this exchange. One possible location to establish this secure channel is between the NAR (at the AR) and the NAA (at the PDP). This channel must be end-to-end in the sense that the NAE must not gain access to the contents of this secure channel. The exact implementation of this secure channel is dependent on the area of application and network configuration. An example of this channel would be one established through PEAP or TTLS, running over EAP in the context of the 802.1X configuration. Similarly, an IKE Phase-1 SA could be used to negotiate a special Phase-2 SA that then protects the integrity information transfer in the case of a VPN. Authorization for TNC Client/TNC Server and IMC/IMV: In general, a TNCC (TNCS) should only communicate with authorized IMCs (IMVs). This requirement comes from the need to prevent bogus IMCs (IMVs) from opening communications with valid TNC Clients, thereby opening the possibility of a Denial-of-Service attack (at the very least) against the TNCC/TNCS. Self-integrity of AR and PDP: Since the integrity values being communicated between two endpoints are only as good as the self-integrity of these respective endpoints, it is paramount that both the AR and PDP are protected against attacks that illegally modify the system configurations of these elements. This need is particularly acute in the case of platforms without a TPM. Secure Channel between MAP and MAP Clients: Metadata communicated between MAP Clients and the MAP is security sensitive. The confidentiality and integrity of this data must be preserved. Therefore, communication between the MAP and the MAP Clients is required to be secure. Self-integrity of MAP and MAP Clients: Compromise of the MAP or MAP Clients could lead to corruption of the MAP database. This could lead to network access being denied or allowed improperly. Therefore, the integrity of the MAP and MAP Clients must be protected. The MAP and MAP Clients should also be checked to ensure their ongoing health (e.g. using TNC integrity checks and/or a TPM). Security of Remediation Solutions: In the event that remediation of an AR requires that AR to communicate with a Remediation Server (RS) and obtain integrity-related updates, it is important to consider the security of the RS. If signed updates with careful versioning are placed on the RS, some protection against RS compromise can be achieved. However, strong protection for the RS should be employed. Protection of Information Assets across Interfaces: It is important that implementations of the TNC Architecture protect information assets as these traverse the various interfaces defined in the architecture. These information assets include state change notifications (between TNCC and IMV, and between TNCS and IMC), message exchanges between elements, vendor specific messages (exchanged between the IMC and IMV as peers) and remediation results (from TNCC to the IMV). Protection of interfaces from threats: The ability of a TNCC on a platform to discover the IMCs on that platform has benefits as well as security risks. Thus, a TNCC must have sufficient privileges (set by the Administrator according to policy) in order to access
information regarding available IMCs on the same platform. The design and implementation of interfaces must therefore prevent against spoofing (by a rogue IMC/IMV), against denial of service (provided by a legitimate IMC/IMV and against illegal tampering (IMC/IMV parameters modified). This section is only a brief summary of security considerations related to the TNC architecture. Each TNC interface specification includes an in-depth Security Considerations section that analyzes the security issues relevant to that interface and makes recommendations for appropriate countermeasures. Each interface specification also contains normative requirements for countermeasures relevant to that interface. All parties are urged to review these sections in detail to understand and properly implement these countermeasures.
9 Privacy Considerations
Privacy is an important issue in the context of trusted network connections. Some aspects that are pertinent to the TNC are as follows: Anonymous access is supported: User authentication (of the client system to the server system) is not required in order to perform an integrity measurement handshake. In scenarios which require protection of the user identity, anonymous network access is supported by this architecture. Owner controlled policy: The architecture allows for negotiation of which measurements may be needed to make access decisions. The platform owner is presumed to have control over the privacy policy and privacy related negotiations. In other words, measurements can be more specific than what is requested and client policies can dictate when it is desirable to abort the connection request in the interest of preserving privacy. Disclosure control mechanisms. The architecture does not prevent IMCs from implementing a disclosure control mechanism driven by privacy policy. IMC implementers may employ filtering on outbound flows to block, replace, modify or un-sign integrity reports. The IMC interface specification does not specify the content of messages exchanged between IMC and IMV; hence the TNCC does not appear to be an appropriate place to apply privacy controls. However, vendor specific extensions to IMCs appear reasonable. IMC selection. The user may determine which IMCs can be installed and/or loaded by the TNCC based on an assessment of the IMC ability to protect privacy. Encryption of sensitive information: If a client does choose to provide specific measurement information in order to gain network access, that information can be encrypted once it leaves the client in order to provide protection of the sensitive measurement data and prevent disclosure to unauthorized parties. Anonymity of published information: MAP Clients may publish information about endpoint health, network access, events (which may include information about what services an endpoint is accessing), roles and capabilities, and the identity of the end user operating the endpoint. Any of this published information may be queried by other MAP Clients and could potentially be used to correlate network activity to a particular end user. Care should be taken by deployers of IF-MAP to ensure that the information published by MAP Clients does not violate agreements with end users or local laws and regulations.
These measures ensure that privacy can be properly protected in the TNC architecture.
10 References
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] Trusted Computing Group, TCG Specification Architecture Overview, Revision 1.3, March 2007. Trusted Computing Group, IWG Reference Architecture for Interoperability (Part 1), Specification Version 1.0, June 2005. Trusted Computing Group, TCG Credential Profile, Specification Version 1.0, January 2006. Trusted Computing Group, TPM Specifications v1.2, March 2006. Trusted Computing Group, TSS Specifications v1.2, January 2006. Trusted Computing Group, TNC IF-TNCCS Specification v1.2, May 2009. Trusted Computing Group, TNC IF-TNCCS-SOH Specification v1.0, May 2007. Trusted Computing Group, TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification v1.1, May 2007. Trusted Computing Group, TNC IF-PEP: Protocol Bindings for RADIUS Specification v1.1, February 2007. Trusted Computing Group, TNC IF-IMC Specification v1.2, February 2007. Trusted Computing Group, TNC IF-IMV Specification v1.2, February 2007. Trusted Computing Group, TCG https://www.trustedcomputinggroup.org/groups/glossary/ Glossary. See
C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, D. Spence, Generic AAA Architecture, RFC 2903, Experimental, August 2000, IETF. J. Vollbrecht, et al., AAA Authorization Framework, RFC 2904, Informational, August 2000, IETF. J. Vollbrecht et al., AAA Authorization Application Examples, RFC 2905, Informational, August 2000, IETF. S. Farrell et al, AAA Authorization Requirements, RFC 2906, Informational, August 2000. B. Aboba et al., Criteria for Evaluating AAA Protocols for Network Access, RFC 2989, Informational, November 2000, IETF. R. Yavatkar, D. Pendarakis, R. Guerin, A Framework for Policy-based Admission Control, RFC 2753, January 2000, IETF. IEEE802, Port-Based Network Access Control, IEEE Std 802.1X-2004, December 2004, Institute for Electrical and Electronics Engineers (IEEE). B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Extensible Authentication Protocol (EAP), RFC3748, Standards Track, June 2004, IETF. C. Rigney, S. Willens, A. Rubens, W. Simpson , Remote Authentication Dial In User Service (RADIUS), RFC2865, Standards Track, June 2000. D. Harkins, D. Carrel, The Internet Key Exchange (IKE), RFC 2409, Standards Track, November 1998, IETF. C. Kaufman, Internet Key Exchange (IKEv2) Protocol, RFC4306, Standards Track, December 2005, IETF. Trusted Computing Group, TNC IF-MAP Binding for SOAP Specification v1.1, May 2009.
Trusted Computing Group, IWG IF-PTS Specification v1.0, November 2006. Trusted Computing Group, TNC CESP Specification v1.0, May 2009. Trusted Computing Group, TNC Federated TNC Specification v1.0, May 2009 Trusted Computing Group, TNC IF-T Binding to TLS v1.0, May 2009
11 TNC Glossary
When used in TNC documents, the following terms are defined as below. Please also see [12] for broader TCG related terminology. Term Access Requestor (AR) Definition Within the TNC framework for endpoint integrity, the Access Requestor is the role of the element seeking connectivity to a network that implements the TNC Architecture. The AR consists of three main functions: the NAR, the TNCC and the IMC. See glossary for the definition of these components. This is information provided by IMCs describing the status and configuration of the AR. The actions towards establishing a level of trust in the state of an endpoint, such as ensuring the presence, status, and upgrade level of mandated applications, revisions of signature libraries for anti-virus and intrusion detection and prevention system applications, and the patch level of the endpoints operating system and applications. An optional function in the TNC framework which may not be directly involved with initial network access decisions nor directly connected to the AR. Flow Controllers may share information with other TNC components through IF-MAP and may aid in on-going and granular enforcement of network security policy compliance. Refers to the recommendation given by each IMV to the TNCS as to what type of network access or isolation action should be taken based on the IMV's evaluation. Example IMV Action Recommendations include: recommend full (normal) access; recommend isolation (limited or quarantined access); and recommend denial (no access). Refers to the result returned by each IMV to the TNCS regarding the state of the endpoint's compliance, based on the IMV's evaluation. Example IMV Evaluation Results include: endpoint is compliant with policy; endpoint is non-compliant and noncompliance is minor; endpoint is non-compliant and noncompliance is major; compliance is unknown. A handshake between a TNCC and a TNCS during which the integrity of an Access Requestor is checked against policy to determine whether the Access Requestor should be given network access. This is an example of attestation protocol in the context of TNC. The set of platform specific information that makes up a Trusted Platform. This ranges from information about a platforms hardware components, TPM information (e.g. versions), PCRs, peripherals, Trusted Building Blocks, OS/Kernel, drivers, Applications, Anti-Virus information and others. Each specific usecase determines which information set will be of interest. As such, it is expected that for a given situation these will be predetermined or pre-configured by an authorized entity (e.g. IT administrator).
Flow Controller
Integrity Information
The informational output from applying an Integrity Measurement process. An IMC is a function of a software component that runs on an Access Requestor (AR), measuring certain aspects of the AR's integrity, including software versions, patches, Anti-Virus and others. An IMC may use the TCG Platform Trust Service (PTS) to obtain integrity information regarding every component of the platform on which the IMC sits. Multiple IMCs may reside on a single AR. An Integrity Measurement Verifier (IMV) is the function of the PDP that verifies a particular aspect of the ARs integrity, based on measurements received from an IMC and/or other data. Multiple IMVs may reside on a single PDP. The action of separating an Access Requestor onto a separate network virtual or physical possibly, though not necessarily, for the purposes of performing Remediation on that AR. The role in the TNC framework of a broker/server to which metadata may be published and from which metadata may be searched and subscribed to using the IF-MAP protocol. The role in the TNC framework of an element which publishes metadata to or searches / subscribes to metadata from a MAP. The component of the MAP providing the function that allows other TNC components to publish, subscribe to, and search metadata. Refers to the decision sent from the NAA to the NAE via IF-PEP to control the endpoint's network access. This decision may be a simple binary value (allow or deny network access) or it may include information (such as a VLAN ID) for purposes such as Isolation. Alternatively, it may include information (such as a VLAN ID) for purposes such as Isolation. The Network Access Authority (NAA) is the network layer function of the PDP that decides whether a Network Access Requestor (NAR) should be granted access to a network. The Network Access Enforcer (NAE) is the network layer function of the PEP that consumes and enforces access control policies from a Network Access Authority (NAA). The Network Access Requestor (NAR) is the function of the Access Requestor (AR) responsible for negotiating and establishing network access onto a given network. The NAR is expected to implement network layer protocols, covering security, message transport and others. In the context of 802.1X, the NAR can be identified as the Supplicant. The act of verifying both the proof-of-identity and integrity-status of a given platform. The Platform Trust Services (PTS) is a system service that exposes trusted platform capabilities to TNC components that reside on a Trusted Platform containing a TPM. PTS services include protected key storage, asymmetric cryptography, random numbers, platform identity, platform configuration reporting and
Metadata Access Point (MAP) Metadata Access Point Client (MAPC) Metadata Access Point Server (MAPS) Network Access Decision
Network Access Authority (NAA) Network Access Enforcer (NAE) Network Access Requestor (NAR)
integrity state tracking. Policy Decision Point (PDP) The PDP is the role of an element evaluating the status of a TNC Client (seeking network connectivity) and deciding upon some network-related action to be enforced by the PEP. The PDP embodies the security and integrity related policies governing the network. The PEP is the role of an element within the TNC Architecture that controls access to a protected network, whose policies are implemented through a Policy Decision Point (PDP). The PEP enforces the decision of the PDP. The action of updating an element seeking network connectivity (that fails integrity check) with the necessary software, firmware and integrity-related parameters updates. An optional function of an element in the TNC framework which may not be directly involved with initial network access decisions nor directly connected to the AR. Sensors may monitor network and AR activity and the share information with other TNC components through IF-MAP. The TNCC function is the software component on the Access Requestor (AR) that aggregates integrity measurements (from IMCs), assists the management of the Integrity Check Handshakes and assists in the measurement and reporting of platform and IMC integrity. The TNCS is the function on the PDP that manages the flow of messages between Integrity Measurement Collectors (IMC) and Integrity Measurement Verifiers (IMV), gathers recommendations from IMVs, and combines those recommendations (based on policy) into an overall TNCS Action Recommendation to the NAA. Refers to the final, combined recommendation given by the TNCS to the NAA. Phase I of the specification does not mandate values for this recommendation; however, example action recommendations are expected to include: recommend full (normal) access; recommend isolation (limited or quarantined access); and recommend denial (no access).
Remediation
Sensor