A security architect is designing a new infrastructure using both type 1 and type 2 virtual
machines. In addition to the normal complement of security controls (e.g. antivirus, host
hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store
cryptographic keys used to sign code and code modules on the VMs. Which of the following will
meet this goal without requiring any hardware pass-through implementations?
A.
vTPM
B.
HSM
C.
TPM
D.
INE