Intel Desktop Boards D865GRH Product Guide
•Loss of Trusted Platform Module Ownership: Trusted Platform Module Ownership/contents may be cleared (via a BIOS switch) to allow for the transfer of a system to a new owner. If TPM ownership is cleared, either intentionally or in error, recovery procedures may allow the migratable keys to be recovered and may restore access to encrypted data. Read the Security Precautions for Emergency Recovery File Back Up Procedures.
•TPM Keys are Hierarchical: All TPM keys have a place within a hierarchy. Within this hierarchy, keys must be loaded into the TPM before child keys can be used. It may not be obvious that any particular key is child or parent. If a key is backed up but the parent key is either not available or the password for the parent key is not available, the associated data will not be available. Read the Security Precautions for Emergency Recovery File Back Up Procedures.
Security Precautions
Security, like any other aspect of computer maintenance, requires planning. What is unique about security has to do with understanding who are “friends” and who are adversaries. The TPM provides mechanisms to enable the owner/user to protect their information from adversaries. To provide this protection, the TPM effectively puts “locks” around the data. Just like physical locks, if keys or combinations are lost, the assets (data) may be inaccessible not only to adversaries, but also to asset the owner/user.
The TPM provides two classes of keys: migratable and
CAUTION
The following precautions and procedures may assist in recovering from any of the previously listed situations. Failure to implement these security precautions and procedures may result in unrecoverable data loss.
86