In an increasingly digitalized world, protecting your business’s digital assets is becoming more urgent by the day. Realizing the need to protect data from malicious actors, researchers created encryption. And I am not talking about the Enigma here, but software-based encryption algorithms, with their public and private signing keys, and so on.
Like every other technology, encryption methods have evolved throughout the years. However, the goal remained the same: encryption is there to secure our digital communications. In the race against the "bad guys", the "good guys" came up with TPM-based (Trusted Platform Module) encryption in an attempt to advance data protection methods.
This blog post explores the benefits of using these secure keys, how to use them with NXLog, and their impact on strengthening security measures and meeting compliance requirements.
What is a TPM?
TPM is a chip usually soldered to the motherboard. Simply put, it is a place you should consider safe, even if other computer parts are compromised. Modern x86 computers all have this built-in security device (TPM) that you can use to store keys safely. The crux is that the keys in TPM are not exportable but accessible via the Cryptography API: Next Generation (CNG). Their non-exportable nature makes them a more secure option.
Although TPM is most renowned for encrypting hard drives, it has many other uses. One of these is encrypting communication over the network—yes, even when you transfer logs containing sensitive information between nodes.
TPM recently gained some attention in tech circles because Windows 11 requires the latest TPM implementation, TMP 2.0, to run.
Why you should use TPM
As you can see, there are numerous reasons to use Trusted Platform Modules in your organization. Let’s look at them one by one.
- Improve security
-
Well, I know "improving security" sounds like a platitude, but that is what it’s all about—helping to make your system and data safer. TPMs implement some very clever features to make that happen.
Some of the most notable benefits include:
-
Non-exportable encryption keys strengthen security by ensuring that private keys cannot be removed or copied.
-
Hardware-based cryptographic storage is less prone to external attacks.
-
Enhances security by providing hardware-based protection for encryption keys.
-
TPM keeps encryption keys isolated from other system components.
-
Ensures system integrity by monitoring for unauthorized software and hardware changes.
-
By supporting TPM-based encryption keys, NXLog offers a robust way to protect your logs during transfer.
There are numerous reasons to employ Trusted Platform Modules in your organization. Let’s look at them.
- Compliance requirements and regulations
-
Fulfilling regulation requirements is an important yet tedious job for any organization. One may feel that there is an ever-growing list of things to comply with. You will be happy to know that TPM-based encryption can also help you tick a few boxes.
Several regulations and compliance mandates either require TPMs or include security requirements for cryptographic modules with the characteristics of TPM chips, especially TPM 2.0.
-
FIPS 140-2 — Security Requirements for Cryptographic Modules
Quoting SSL.com: "As of June 1, 2023, all Code Signing Certificates must comply with the new CA/B Forum regulations to ensure that the subscriber’s private key is generated, stored, and used in a suitable FIPS-compliant hardware." — Meaning that this Federal Information Processing Standard (140-2) specifies the security requirements for cryptographic modules. -
NIST Special Publication 800-63B — Digital Identity Guidelines
The National Institute of Standards and Technology (NIST) in the U.S. recognizes hardware cryptographic modules like TPMs in its digital authentication guidelines. For example, NIST SP 800-63B acknowledges the use of hardware crypto authenticators in securing cryptographic keys and managing authentication mechanisms. -
Common Criteria Certification
The Common Criteria Recognition Arrangement (CCRA) is an international framework that provides standards for evaluating TPM products. The framework is available for both TPM 1.2 and TPM 2.0, which outline specific protection profiles and security requirements for the evaluation criteria. -
Windows requirements
Microsoft does not allow upgrading computers to its Windows 11 operating system in the absence of a TPM 2.0 chip. For more details, see the Microsoft Support article Enable TPM 2.0 on your PC.
-
Using TPM-encrypted keys with NXLog
You can use TPM-based encryption with all NXLog modules that support TLS/SSL, such as the SSL and HTTPS input and output modules. I will now show you how easy it is to transfer logs securely using TPM-encrypted keys and NXLog.
This configuration listens for log data via NXLog’s im_ssl module.
The connection is secured with a certificate read from the Local Computer/Personal
certificate storage, while its key is read from a TPM chip.
This is done by setting thumbprints for the Certificate Authority (CA) and the certificate.
That’s it. No private keys and no passwords are needed.
<Input in>
Module im_ssl (1)
ListenAddr 192.168.1.10:1514 (2)
UseCNGCertificates TRUE (3)
CAThumbprint 60baa2372191f0d59e68c1fc419d3a61679a0977 (4)
CertThumbprint cb48c5f9662c7ea8d90dbd40c283453395492408 (5)
</Input>
1 | Specifies that SSL/TSL transport is used in the connection via the im_ssl module. For more details, see the im_ssl documentation in the NXLog Agent Reference Manual. |
2 | It specifies the address and port to listen to. For more details, see the ListenAddr directive in the im_ssl documentation. |
3 | This directive instructs the configuration to use CNG certificates. For more information, see the UseCNGCertificates directive in the NXLog Enterprise Edition Reference Manual. |
4 | Specifies the thumbprint of the certificate authority (CA) certificate. The CAThumbprint directive is in the im_ssl documentation. |
5 | Specifies the certificate’s thumbprint that is presented to the remote client during the SSL handshake. See the CertThumbprint directive in the NXLog agent Reference Manual. |
Conclusion
As discussed in this blog post, TPM encryption and non-exportable keys offer a more secure method for transferring log data over the network. The inherent design of TMP chips ensures that encryption keys are kept safe even if other measures fail. However, using hardware-based encryption keys is not only a technical improvement but is also becoming a regulatory requirement.
An increasing number of compliance regulations list the necessity to keep encryption keys in FIPS-compliant hardware. This trend will likely continue and the number of compliance mandates with such requirements will likely grow over time.
At NXLog, everything revolves around security. We are dedicated to supporting the latest security standards to safeguard the integrity of our clients' log data. By integrating TPM-based encryption into our software, we ensure that your data is compliant with current regulations and secured against malicious threats.