ietf-teep / architecture

TEEP architecture draft
5 stars 9 forks source link

Add more detail to the Compromised TAM section #261

Closed bremoran closed 2 years ago

bremoran commented 2 years ago

Merely checking the certificate of a compromised TAM requires reliance on certificate revocation to detect a TAM compromise. This does not deal with APT attacks on TAMs, which are high value targets given the authority they have over TEEs. Additional checks are needed.

dthaler commented 2 years ago

Addresses #241