Hardware and Software Security
Table 26. Hardware Security
Hardware Security
TPM 2.0 FIPS 140-2 Certied, TCG Certied*
* TCG certication (February 2018)
Yes,
Discrete TPM 2.0 IC ( Backward downgradable to 1.2)
BIOS disable TPM (China/Russia) Yes
Optional Control Vault 2.0 Advanced Authentication with FIPS
140-2 level 3 certication (HW authentication congurations)
Yes, TCG Certied (February 2018)
Optional hardware authentication bundle 2:
• FIPS 201 contacted smart card
• Control Vault 2.0
Yes
Optional hardware authentication bundle 4:
• Touch nger print reader
• FIPS 201 contacted smart card
• Contactless smart card
• NFC
• Control Vault 2.0
Yes
• Synaptics Fingerprint reader
• Synaptics Smart Card Reader + Contactless Smart Card
Security lock slot (Kensington T-Bar Lock Slot) Yes
SED (Opal 2.0 - SATA Interface) Yes
Statement of Non-Volatility Yes
Bundle 6 Control Vault 2 and touch ngerprint Yes
POA: Power On Authentication Yes(Supported with Fingerprint reader only)
Table 27. Software Security
Software security
Latitude Security software per software functional plan/cycle list
Yes
D-Pedigree for BIOS (Secure Supply Chain Functionality) provides:
• Secure Supply Chain for a Product covers BIOS Image Integrity
• Chain of Custody
• Part Traceability
Yes
Welcome - Getting Started 21