Trusted computing applied in Open Power...

18
Trusted computing applied in Open Power Linux Qiuyin Mao, R&D Director Zhiqiang Tian, Senior BIOS Engineer Beijing Neu Cloud Oriental System Technology Co. Ltd. (NCO China) Join the conversation at #OpenPOWERSummit 1 #OpenPOWERSummit

Transcript of Trusted computing applied in Open Power...

Page 1: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Trusted computing applied in Open Power Linux

Qiuyin Mao, R&D Director Zhiqiang Tian, Senior BIOS Engineer

Beijing Neu Cloud Oriental System Technology Co. Ltd.

(NCO China)

Join the conversation at #OpenPOWERSummit 1

#OpenPOWERSummit

Page 2: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Agenda

NCO(China) introduction

Background

Demonstrated Features

Our experience

Benefit

Join the conversation at #OpenPOWERSummit 2

Page 3: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Beijing Neu Cloud Oriental System Technology Co., Ltd

Join the conversation at #OpenPOWERSummit 3

Leading High Performance Server Manufacturer in China, Invested By IBM

Teamsun’s Holdings Subsidiary Neu Cloud is committed to the events focusing on the IBM POWER servers manufacturing, the localization and the well matched platform and ecological system. Owing to establish a comprehensive ecological system and manufacturing chain, Neu Cloud infuses substantial R&D into the domains of server, database, middleware, virtualization, cloud computing and big data. What’s more, joint great efforts with leading enterprises by reaching agreements to chart a promising future.

Page 4: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Background

The computer system security problem is more and more emphasized by the Chinese government and it has created its own security standards. Open POWER as a new open platform, it urgently needs to achieve China's trusted computing security standard and provides the prototype system that conforms to the specifications in order to satisfy the demands of the development of Open POWER ecosystem in China.

Join the conversation at #OpenPOWERSummit 4

Page 5: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 5

Trusted motherboard: As the RTM of the Trusted computing, provides the highest security solution.

Page 6: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 6

TPCM card: -Embedded in mother board that has the highest security standard but it need design new platform board -As a PCIE device, implements TPCM and no HW change in system. It can work after PCIE device is ready during BIOS post stage. -As a USB device, it can only work after OS loads its’ driver.

Page 7: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 7

Implemented trusted chain pass from RTM to application

Page 8: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 8

Based on the white list and trusted database to implement Trusted Computing in OS kernel.

Page 9: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 9

Support TPCM card in open power firmware level to support open power virtualization

Page 10: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Demonstrated Features

Join the conversation at #OpenPOWERSummit 10

Apply the open power trusted computer node to China security Cloud system

Page 11: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 11

We choose Linux as the application OS and it is easy to port the whole trusted computing software stack to other UNIX like OS such as AIX.

Page 12: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 12

Debian

NCO Trusted Linux

KernelEnhance、 Patchset、 Version update

Page 13: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 13

Debian

NCO High-Assurance Linux

Linux Build Infrastructure

Linux Automated Testing Infrastructure

Intel/AMD X86

Loongson3A/3B

ARM64

* We developed Linux release version based on Debian and can support Loongson,ARM,X86/AMD and Power

* We setup a strong automated building and testing infrastructure to speed up the development

OpenPOWER Power8

Page 14: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 14

Security Enhanced Power Linux Architecture

Secured Linux Kernel

Trusted immune system (Trusted kernel) Kernel Space

Trusted SW level( Service、API) User Space

SW support level( SDK)

Application(Web Service…)

Page 15: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 15

is a kind of new computing operation and protection mode, it utilize active immunization through identification, state metric, confidential storage function so that it can timely recognize " own" or threat and block harmful substances into the body.

Page 16: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Audit system behavior

Our experience

Trusted Immune Management Platform

Trusted Computing Architecture

Audit system behavior

Set subject access rule

System Manage Security Manage Audit Manage

Get subject, object

Identify Control

Alert

Page 17: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Our experience

Join the conversation at #OpenPOWERSummit 17

Security Hole Detect

Service

Audit Service

Trusted Policy

Service

Trusted SW Service

SW certification

service

Security Trend Service

Immune Service

Page 18: Trusted computing applied in Open Power Linuxopenpowerfoundation.org/wp-content/uploads/2015/03/Qiuyin-Mao_… · -Embedded in mother board that has the highest security standard

Your logo here

Benefit

The prototype implementation on the open power system that abides by the security standards of China provides strong support for the comprehensive power system promotion and in the meantime it provides a powerful guarantee for the development of power ecosystem in China high security level market. It enriches the China ISV and IHV’s options range with this total solution from hardware to software.

Join the conversation at #OpenPOWERSummit 18