InvestorsHub Logo
Followers 15
Posts 452
Boards Moderated 0
Alias Born 07/22/2003

Re: None

Wednesday, 12/28/2011 8:52:13 PM

Wednesday, December 28, 2011 8:52:13 PM

Post# of 248808
Army highlights Trusted Computing for Ground Vehicles

Just like in it's CHESS Program for workstations and laptops, the US Army is standardizing it's computing form factors for tactical ground vehicles and weapons platforms to provide a modular family of computing capability with three levels of computing and display hardware supported ( Basic, Intermediate, and Advanced levels of architecture).

Details can be found in link at the end of this post.
=================================
Parts that jump out? ( Perhaps a preview of upcoming Army CHESS specs too ?? )
=================================

Performance Specification for
Mounted Family Of Computer Systems (m-FoCS)

3.2.1.1.19 Information Assurance

The protection of the m-FoCS and the network to which it is attached is of vital importance to the warfighter. The lowest layers of this protection architecture rely on the concepts of Trusted Computing (see 686Hwww.trustedcomputinggroup.org/). The following requirements are allocated to the m-FoCS to implement the architecture:

(a) The PU shall support the following security features:
a. The PU shall provide Intel® Trusted Execution Technology (TxT) or equivalent.
b. The PU shall provide Intel® Virtualization Technology for Directed I/O (VT-d) or equivalent.
c. The PU shall provide Intel® Hardware Virtualization Technology (VT-x) or equivalent.

(b) The PU shall include a Trusted Platform Module (TPM) version 1.2 or higher. Informational: This requirement meets requirement (4) of the Department of Defense Chief Information Officer John G. Grimes memo of 03 July 2007.


(e) If a separation kernel or other virtualization technology is to be used, the hardware abstraction layer shall make the ATA T13 Trusted Send/Trusted Receive command sets available to support the use of Self Encrypting Hard Disk Drives.

(g) If a separation kernel or virtualization technology is used to provide multiple independent levels of security (MILS), it shall be assumed that volatile and non-volatile memory allocations between security domains shall be fixed as opposed to dynamically allocated.

=================================

Incorporated Document References to :

NIST Special Publication 800-147 BIOS Protection Guidelines April 2011

D51397 Intel® Virtualization Technology for Directed I/O – Architecture Specification 1.2 September 2008

Intel 315168 Intel® Trusted Execution Technology Software Development Guide 006 December 2009

ISO/IEC 11889 Information technology – Trusted Platform Module 1st Edition 15 May 2009

Trusted Computing Group TCG Storage Security Subsystem Class: Opal. Specification version 1.00 Rev 3.00 4 February 2010


=================================
From Q&A responses :

Use of industry-standard self-encrypting drives is encouraged. Use of composed solutions through NSA's Commercial Solutions for Classified, as an alternative to traditional Type 1 encryption for data at rest, is encouraged.

=================================




http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEsQFjAH&url=https%3A%2F%2Facquisition.army.mil%2Fasfi%2Fattachment_viewer.cfm%3FSol_Number%3DW15P7T11RB411%26Seq_Nbr%3D256425%26FILE_NAME%3Dm-FoCS_Spec_Final_Draft.docx%26FILE_EXTENSION%3Ddocx&ei=H7v7TrCTGY2HsAL2pujMAQ&usg=AFQjCNH1cEXBlFDVKSek-JSzF0oTqaL0Kw&sig2=IsorFLSIruwrLGcPMLbIhg" rel="nofollow" target="_blank" >http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEsQFjAH&url=https%3A%2F%2Facquisition.army.mil%2Fasfi%2Fattachment_viewer.cfm%3FSol_Number%3DW15P7T11RB411%26Seq_Nbr%3D256425%26FILE_NAME%3Dm-FoCS_Spec_Final_Draft.docx%26FILE_EXTENSION%3Ddocx&ei=H7v7TrCTGY2HsAL2pujMAQ&usg=AFQjCNH1cEXBlFDVKSek-JSzF0oTqaL0Kw&sig2=IsorFLSIruwrLGcPMLbIhg

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.