Details
-
Type:
Epic
-
Status: Open
-
Priority:
(None)
-
Resolution: Unresolved
-
Affects Version/s: None
-
Fix Version/s: None
-
Labels:None
-
Epic Name:Hardware security for signing
-
Epic Total Estimate:21
-
DoD:
Description
Security-sensitive environments rely on a "Hardware Security Module" or alternatively a TPM to store and use cryptographic keys so they can not easily be stolen by attackers.
HSM/TPM hardware can also be used in a CI/CD setting to store the key which is used to sign the Mender Artifacts.
User value (why)
- Lower risk of compromising keys used by Mender
- Integration with existing key management system used by other device application
Acceptance criteria
- mender-artifact can use private key stored in hardware to generate signatures
- Mender client can use a public key stored in hardware to verify signatures