Stanford CIS

Bruce Schneier on the Best Practices Document

By Stefan Bechtold on

Bruce Schneier has written an interesting and widely-circulated blog entry about TCG's Best Practices document. He is wondering why the document applies to hardware-based TC architectures only, but not to Trusted Network Connect (TNC) and TC architectures that are purely software-based. While I generally agree with his comments, here are three slight qualifications:

In the end, it comes down to what importance one thinks the Best Practices document has. Some people may think it is just a waste of paper. In a comment to his blog entry, Bruce disagrees:

"The point of the document is not to have teeth, but to be a technical resource for other documents with teeth. If the U.S.government were serious about computer security, for example, they could require all the computers they buy be compliant with this document."

I tend to agree with Bruce; and even if the U.S. government decides not to base any policy decisions on this document, other governments might (as you may know, the German government has been pretty active in TC-related matters, e.g.). So if Bruce's assessment is correct, then it would indeed be very bad to have a policy document for hardware-based TC only.

Published in: Blog , tcblog