Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1178

Trusted Platform Module (TPM)

What is Trusted Platform Module (TPM)?

Trusted Platform Module (TPM)Standards-based security chip soldered to a mainboard or implemented in firmware that provides hardware-rooted key storage, attestation, and measured boot.


A TPM is a TCG-standardized cryptoprocessor that supplies a hardware root of trust for endpoint security. The current standard is TPM 2.0, available as a discrete chip (dTPM), firmware-based (fTPM), or virtual (vTPM) variants. It offers key generation and sealing, RSA/ECC signing, PCR-based measured boot, monotonic counters, and remote attestation. Operating systems use the TPM to anchor BitLocker, Windows Hello, FileVault, dm-verity, Linux Unified Key Setup, and platform identity. TPM 2.0 is a Windows 11 requirement. Limitations include side-channel attacks on older firmware, the TPM-sniffing attack on plaintext SPI buses, and limited resistance against a physically present attacker.

Examples

  1. 01

    BitLocker sealing the disk encryption key to TPM PCRs so the disk only unlocks on a trusted boot path.

  2. 02

    Cloud VM using a vTPM for remote attestation against a confidential compute service.

Frequently asked questions

What is Trusted Platform Module (TPM)?

Standards-based security chip soldered to a mainboard or implemented in firmware that provides hardware-rooted key storage, attestation, and measured boot. It belongs to the Cryptography category of cybersecurity.

What does Trusted Platform Module (TPM) mean?

Standards-based security chip soldered to a mainboard or implemented in firmware that provides hardware-rooted key storage, attestation, and measured boot.

How does Trusted Platform Module (TPM) work?

A TPM is a TCG-standardized cryptoprocessor that supplies a hardware root of trust for endpoint security. The current standard is TPM 2.0, available as a discrete chip (dTPM), firmware-based (fTPM), or virtual (vTPM) variants. It offers key generation and sealing, RSA/ECC signing, PCR-based measured boot, monotonic counters, and remote attestation. Operating systems use the TPM to anchor BitLocker, Windows Hello, FileVault, dm-verity, Linux Unified Key Setup, and platform identity. TPM 2.0 is a Windows 11 requirement. Limitations include side-channel attacks on older firmware, the TPM-sniffing attack on plaintext SPI buses, and limited resistance against a physically present attacker.

How do you defend against Trusted Platform Module (TPM)?

Defences for Trusted Platform Module (TPM) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Trusted Platform Module (TPM)?

Common alternative names include: TPM 2.0.

Related terms

See also