BS ISO/IEC 11889-1:2015 defines the architectural elements of the Trusted Platform Module (TPM), a
device which enables trust in computing platforms in general. Some TPM concepts are explained
adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a
TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in a
computing platform, this part of ISO/IEC 11889 provides some guidance for platform requirements.
However, the scope of ISO/IEC 11889 is limited to TPM requirements.This part of ISO/IEC 11889 illustrates TPM security and privacy techniques in the context of a platform
through the use of cryptography. It includes definitions of how different cryptographic techniques are
implemented by a TPM. The scope of ISO/IEC 11889 does not include cryptographic analysis or
guidance about the applicability of different algorithms for specific uses cases.TPM requirements in this part of ISO/IEC 11889 are general, covering concepts like integrity protection,
isolation and confidentially. Defining a specific strength of function or assurance level is out of scope for
ISO/IEC 11889. This approach limits the guarantees provided by ISO/IEC 11889 itself, but it does allow
the TPM architectural elements defined to be adapted to meet diverse implementation and platform
specific needs.Cross References:ISO/IEC 9797-2ISO/IEC 10116:2006ISO/IEC 11889-2ISO/IEC 11889-3ISO/IEC 11889-4FIPS PUB 186-3FIPS PUB 140-2GM/T 0002:2012GM/T 0003.1:2012GM/T 0003.2:2012GM/T 0003.3:2012GM/T 0003.4:2012GM/T 0003.5:2012GM/T 0004:2012IEEE 1363:2000IEEE 1363a:2004IEEE 1363:2000IEEE P1363.3IETF RFC 3447IETF RFC 4034ISO/IEC 10118-3ISO/IEC 11770-3:2008ISO/IEC 14888-3ISO/IEC 15946-1ISO/IEC 15946-5:2008ISO/IEC 18033-3NIST SP800-56ANIST SP800-57 Part 1NIST SP800-90 ANIST SP800-108Replaces BS ISO/IEC 11889-1:2009 which remains currentAll current amendments available at time of purchase are included with the purchase of this document.