A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition
to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect
needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules onthe VMs. Which of the following will meet this goal without requiring any hardware pass-through
implementations?
A.
vTPM
B.
HSM
C.
TPM
D.
INE