In computer systems, establishing the level of assurance based on the defined security models so that the computer system can be trusted for use in critical infrastructure is called trusted computing.
The following are some of the concepts that relate to information security aspects of a trusted computing architecture:
Trusted Computing Base
It defines – How a vendor should develop its Hardware, Software, Firmware to establish some level of Trust on CIA – Originally Documented in Orange Book.
Organizations must understand the security capabilities of any information systems that they implement. This section discusses memory protection, virtualization, Trusted Platform Module, interfaces, and fault tolerance.
Organizations can implement different policy mechanisms to increase the security of information systems.