hardwareSecurityAshwinBaligaV2

This commit is contained in:
cchavez-msft
2024-07-08 16:50:24 -04:00
committed by GitHub
parent 7e773582bd
commit c0154ee24b

View File

@ -27,8 +27,6 @@ Pluton supports the TPM 2.0 industry standard, allowing customers to immediately
As with other TPMs, credentials, encryption keys, and other sensitive information cannot be easily extracted from Pluton even if an attacker has installed malware or has complete physical possession of the PC. Storing sensitive data like encryption keys securely within the Pluton processor, which is isolated from the rest of the system, helps ensure that attackers cannot access sensitive data - even if attackers use emerging techniques like speculative execution.
In an ongoing commitment to enhancing security, Microsoft will introduce additional Pluton Security Processor capabilities, such as a Key Storage Provider (KSP). This KSP will provide advanced protection to Microsoft Entra and Intune credentials. This is a testament to the continuous efforts to stay ahead of potential threats and provide users with the most secure experience possible.
Pluton also solves the major security challenge of keeping its own security processor firmware up to date across the entire PC ecosystem. Today customers receive updates to their security firmware from a variety of different sources, which may make it difficult for customers to get alerts about security updates, keeping systems in a vulnerable state. Pluton provides a flexible, updateable platform for its firmware that implements end-to-end security functionality authored, maintained, and updated by Microsoft. Pluton is integrated with the Windows Update service, benefiting from over a decade of operational experience in reliably delivering updates across over a billion endpoint systems. Microsoft Pluton is available with select new Windows PCs.
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**