Trusted Network Connect (TNC) is an
open architecture
Open architecture is a type of computer architecture or software architecture intended to make adding, upgrading, and swapping components with other computers easy. For example, the IBM PC, Amiga 500 and Apple IIe have an open architecture suppor ...
for
Network Access Control
Network access control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security ...
, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the
Trusted Computing Group
The Trusted Computing Group is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 to implement Trusted Computing concepts across personal computers. Members include Intel, AMD, ...
(TCG).
History
The TNC architecture was first introduced at the
RSA Conference
The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia ...
in 2005. TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.
In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network.
Additional uses for TNC which have been reported include
Industrial Control System
An industrial control system (ICS) is an electronic control system and associated instrumentation used for industrial process control. Control systems can range in size from a few modular panel-mounted controllers to large interconnected and in ...
(ICS),
SCADA
Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors an ...
security, and physical security.
Specifications
Specifications introduced by the TNC Work Group:
* TNC Architecture for Interoperability
* IF-IMC - Integrity Measurement Collector Interface
* IF-IMV - Integrity Measurement Verifier Interface
* IF-TNCCS - Trusted Network Connect Client-Server Interface
* IF-M - Vendor-Specific IMC/IMV Messages Interface
* IF-T - Network Authorization Transport Interface
* IF-PEP - Policy Enforcement Point Interface
*
IF-MAP The Interface for Metadata Access Points (IF-MAP) is an open specification for a client/server protocol developed by the Trusted Computing Group (TCG) as one of the core protocols of the Trusted Network Connect (TNC) open architecture.
IF-MAP prov ...
- Metadata Access Point Interface
* CESP - Clientless Endpoint Support Profile
* Federated TNC
TNC Vendor Adoption
A partial list of vendors who have adopted TNC Standards:
*
ArcSight
*
Aruba Networks
Aruba Networks, formerly known as Aruba Wireless Networks, is a Santa Clara, California-based wireless networking subsidiary of Hewlett Packard Enterprise company.
The company was founded in Sunnyvale, California
Sunnyvale () is a city ...
*
Avenda Systems
*
Enterasys
Enterasys Networks, Inc. was an American networking company. Enterasys products included networking equipment ranging from routers, switches, and IEEE 802.11 wireless access points and controllers. The company formed in March 2000 as a spin-off ...
*
Extreme Networks
Extreme Networks is an American networking company based in San Jose, California. Extreme Networks designs, develops, and manufactures wired and wireless network infrastructure equipment and develops the software for network management, policy, a ...
*
Fujitsu
is a Japanese multinational information and communications technology equipment and services corporation, established in 1935 and headquartered in Tokyo. Fujitsu is the world's sixth-largest IT services provider by annual revenue, and the la ...
*
IBM
*
Pulse Secure
*
Juniper Networks
Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security products, ...
*
Lumeta
*
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
*
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
*
Nortel
Nortel Networks Corporation (Nortel), formerly Northern Telecom Limited, was a Canadian Multinational corporation, multinational telecommunications and data networking equipment manufacturer headquartered in Ottawa, Ontario, Canada. It was foun ...
*
ProCurve
*
strongSwan
* Wave Systems
Also, networking by
*
Cisco
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
*
HP
*
Symantec Symantec may refer to:
*An American consumer software company now known as Gen Digital Inc.
*A brand of enterprise security software purchased by Broadcom Inc.
Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
*
Trapeze Networks
*
Tofino
Tofino ( ) is a town of approximately 2,516 residents on the west coast of Vancouver Island in the Canadian province of British Columbia. The District of Tofino is located at the western terminus of Highway 4 on the tip of the Esowista Penins ...
TNC Customer Adoption
The U.S. Army has planned to use this technology to enhance the security of its computer networks.
The
South Carolina Department of Probation, Parole, and Pardon Services has tested a TNC-
SCAP integration combination in a pilot program.
See also
*
IF-MAP The Interface for Metadata Access Points (IF-MAP) is an open specification for a client/server protocol developed by the Trusted Computing Group (TCG) as one of the core protocols of the Trusted Network Connect (TNC) open architecture.
IF-MAP prov ...
*
Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of Confidential Computing. The core id ...
*
Trusted Computing Group
The Trusted Computing Group is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 to implement Trusted Computing concepts across personal computers. Members include Intel, AMD, ...
*
Trusted Internet Connection The Trusted Internet Connection initiative (also known as TIC, Office of Management and Budget (OMB) Memorandum M-08-05) is mandated in an OMB Memorandum issued in November 2007. The memorandum was meant to optimize individual external connections, ...
References
{{Reflist, 30em
Sources
*Dornan, Andy
“'Trusted Network Connect' Puts Hardware Security Agent In Every PC” “Information Week Magazine”, UBM Techweb Publishing.
*Vijayan, Jaikumar
“Vendor Group Adds Net Access Specs” “Computer World Magazine”, IDG Publishing.
*Higgins, Kelly Jackson
“Trusted Computing Group Widens Security Specs Beyond Enterprise Networks” “Dark Reading”, UBM Techweb Publishing.
*Townsend, Mark
“Naked endpoints on your net, and what to do about them” “SC Magazine”, Haymarket Media.
*Fang, Juan and Zeng, Hongli
“The Model of Trusted Network Connect Based on Credibility of the Hierarchy” nswctc, vol. 2, pp. 454–457, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
*Howard, Scott (2010-06
“Securing SCADA and Control Networks”“urunkoruma.com”
External links
Trusted Network Connect SpecificationsTNC SDK
Computer network security
Trusted computing