This document provides a framework and recommendations for establishing trusted connections between devices and services based on hardware security modules. It includes recommendations for components such as: hardware security module, roots of trust, identity, authentication and key establishment, remote attestation, data integrity and authenticity.
This document is applicable to scenarios that establish trusted connections between devices and services based on hardware security modules.
This document does not address privacy concerns.