Certification | Trusted Computing Group

Certification

Date Published: January, 01, 2015

Certification

TCG Certification Program

The TCG has created these certification programs to promote consistent quality among products built to the TCG specifications.  This provides a useful tool to assist customers in verifying security and functional compliance of products built to TCG specifications.

TCG currently offers certification efforts in two functional areas – Trusted Platform Modules (TPM) and Trusted Network Communications (TNC).  TNC Certification is open to both members and non-members, whereas TPM Certification is only offered to TCG members.

 

Trusted Platform Module (TPM) Certification

TPM Certification allow TCG members to demonstrate that their TPM product meet a set of Compliance and Security Evaluation requirements that was developed by TCG membership input.  TPM products passing certification are listed on the TPM Certified Products List of this website.

The certification requirements for a member’s TPM product to achieve TCG Certification include:

  • Compliance Testing

The TPM Compliance Test Suite is available to TCG members to validate compliance of TPM products against the TCG Specifications.  Functional testing will be self-tested by TCG members using a TCG developed automated PC Client TPM Compliance Test Suite.  The TCG Certification Program Manager verifies that the TCG member’s test suite results concur with the expected results.

  • Security Evaluation

TCG members are also required to demonstrate Common Criteria certification of their TPM product.

For the TPM 1.2 Family, the Common Criteria Security Assurance Level is at EAL4+ Moderate, in accordance to the PC Client TPM 1.2 Protection Profile by the TCG.

For the TPM 2.0 Family, the Common Criteria Security Assurance Level is at EAL4+ Moderate, in accordance to the PC Client TPM 2.0 Protection Profile by the TCG.

 

Trusted Network Communications (TNC) Certification

The TCG’s TNC Certification allows TCG implementers to demonstrate that network communication products meet a set of Compliance and Interoperability requirements that were developed by TCG membership input.  TNC products passing certification are listed on the TNC Certified Products List of this website.

The certification requirements for TNC products to achieve TCG Certification include:

  • Compliance Testing

The TNC Compliance Test Suite for the following TNC interfaces are available to validate compliance of products against the TCG Specifications:

IF-MAP, IF-PEP, IF-IMC, and IF-IMV.

Functional testing will be self-tested by implementers using a TCG developed automated TNC Compliance Test Suite.  The TCG Certification Program Manager verifies that the TCG implementer’s test suite results concur with the expected results.

  • Interoperability Testing

In addition to Compliance Testing, TNC implementers are also required to demonstrate interoperability at TCG sponsored TNC Plugfests.

Additional Information

The Certification Program Committee has made the documents below available to the public for their education and to increase customer understanding in the procedures and principles used to develop each program.  Please feel free to contact [email protected] for more information.

 

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More