Hardware and Software Security
Table 1. Hardware Security The following table provides the hardware security specifications for your computer: Hardware Security | |
---|
TPM 2.0 FIPS 140-2 Certified, TCG Certified* * TCG certification (February 2018) | Yes, Discrete TPM 2.0 IC ( Backward downgradable to 1.2) |
BIOS disable TPM (China/Russia) | Yes |
Optional Control Vault 2.0 Advanced Authentication with
FIPS 140-2 level 3 certification (HW authentication configurations)
| Yes, TCG Certified (February 2018) |
Optional hardware authentication bundle 2:-
FIPS 201 contacted
smart card
- Control Vault
2.0
| Yes |
Optional hardware authentication bundle 4:- Touch finger print
reader
- FIPS 201 contacted
smart card
- Contactless smart card
- NFC
- Control Vault 2.0
| Yes- Synaptics Fingerprint reader
- Synaptics Smart Card Reader + Contactless Smart Card
|
Security lock slot (Kensington T-Bar Lock Slot) | Yes |
SED (Opal 2.0 - SATA Interface) | Yes |
Statement of Non-Volatility | Yes |
Bundle 6 Control Vault 2 and touch fingerprint | Yes |
POA: Power On Authentication | Yes(Supported with Fingerprint reader only) |
Table 2. Software Security The following table provides the software security specifications for your computer: Software security | |
---|
Latitude Security software per software functional plan/cycle list | Yes |
D-Pedigree for BIOS (Secure Supply Chain Functionality) provides:- Secure Supply Chain for a Product covers BIOS Image Integrity
- Chain of Custody
- Part Traceability
| Yes |
Data is not available for the Topic