The system administrator wishes to implement a hardware-based encryption method that could also be used to
sign code. They can achieve this by:
Utilizing the already present TPM.
Configuring secure application sandboxes.
Enforcing whole disk encryption.
Moving data and applications into the cloud.
Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s
motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic
keys, passwords, or certificates.