Trusted Network Connect
Trusted Network Connect or TNC is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).[1][2][3]
History
The TNC architecture was first introduced at the RSA Conference in 2005.[4] TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.[5]
In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network.[6] Additional uses for TNC which have been reported include Industrial Control System (ICS), SCADA security,[7][8] and physical security.[9]
Specifications
Specifications introduced by the TNC Work Group:[10]
- TNC Architecture for Interoperability
- IF-IMC - Integrity Measurement Collector Interface
- IF-IMV - Integrity Measurement Verifier Interface[11]
- IF-TNCCS - Trusted Network Connect Client-Server Interface[12]
- IF-M - Vendor-Specific IMC/IMV Messages Interface
- IF-T - Network Authorization Transport Interface[13]
- IF-PEP - Policy Enforcement Point Interface[14]
- IF-MAP - Metadata Access Point Interface
- CESP - Clientless Endpoint Support Profile[15]
- Federated TNC[6]
TNC Vendor Adoption
A partial list of vendors who have adopted TNC Standards:[16]
|
|
Also, networking by
TNC Customer Adoption
The U.S. Army has planned to use this technology to enhance the security of its computer networks.[17]
The South Carolina Department of Probation, Parole, and Pardon Services has tested a TNC-SCAP integration combination in a pilot program.[18]
See also
Sources
- Dornan, Andy. “'Trusted Network Connect' Puts Hardware Security Agent In Every PC”, “Information Week Magazine”, UBM Techweb Publishing.
- Vijayan, Jaikumar. “Vendor Group Adds Net Access Specs”, “Computer World Magazine”, IDG Publishing.
- Higgins, Kelly Jackson. “Trusted Computing Group Widens Security Specs Beyond Enterprise Networks”, “Dark Reading”, UBM Techweb Publishing.
- Townsend, Mark. “Naked endpoints on your net, and what to do about them”, “SC Magazine”, Haymarket Media.
- Fang, Juan and Zeng, Hongli. “The Model of Trusted Network Connect Based on Credibility of the Hierarchy”, nswctc, vol. 2, pp.454-457, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
- Howard, Scott (2010-06)(“Securing SCADA and Control Networks”, “Automation.com”.
Notes
- ↑ "Using Trusted Network Connect for NAC — FedTech Magazine" — FedTech Magazine
- ↑ Product Analysis: Network Access Control - Network Computing
- ↑ http://www.interop.com/archive/pdfs/2007-04WhatisTCGTNC.pdf
- ↑ 'Trusted Network Connect' Puts Hardware Security Agent In Every PC - - - Informationweek
- ↑ Vendor Group Adds Net Access Specs - Computerworld
- 1 2 Trusted Computing Group Widens Security Specs Beyond Enterprise Networks - Dark Reading
- ↑ Not your Father's Control System | Tofino Industrial Security Solution
- ↑ Securing SCADA and Control Networks
- ↑ http://www.hirschelectronics.com/Hirsch-PR--PhysSec-NAC_interoperability_demo.asp
- ↑ Trusted Computing Group Continues to Extend TNC Specifications | Current Analysis
- ↑ http://www.opus1.com/nac/tnc/TNC_IFIMV_v1_2_r8.pdf
- ↑ http://www.opus1.com/nac/tnc/if-tnccs-soh-v1_0_r8.pdf
- ↑ Tnc If-M
- ↑ http://www.opus1.com/nac/tnc/TNC_IF-PEP_v1_1_rev_0_7.pdf
- ↑ Naked endpoints on your net, and what to do about them - SC Magazine US
- ↑ http://scap.nist.gov/events/2010/itsac/presentations/day2/Network_Automation-TNC.pdf#page=18
- ↑ https://www.trustedcomputinggroup.org/news/press/member_releases/2006/General_Dynamics_Release.pdf
- ↑ Speed of cybersecurity rises with combination of Trusted Network Connect and Security Content Automation Protocols - Federal Computer Week