Join Now

Interested companies are encouraged to review the Benefits of Membership and apply today!

Join Now

Glossary

Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.  


View Glossary

Learn More

Trusted Network Communications

Trusted Network Communications

The Trusted Network Communications (TNC) Work Group has defined and released an open architecture and a growing set of standards for endpoint integrity. The TNC architecture enables network operators to enforce policies regarding endpoint integrity at or after network connection. The standards ensure multi-vendor interoperability across a wide variety of endpoints, network technologies, and policies.

icon

Specifications in Public Review

This page contains all specifications that are currently in public review.

August 2015 | Specifications | Add to Briefcase

icon

TNC SWID Messages and Attributes for IF-M Specification

The Trusted Network Connect (TNC) Work Group defines an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Software Identification tags (SWID tags) are XML documents that identify a specific software product.

August 2015 | Specifications | Add to Briefcase

icon

TNC Endpoint Compliance Profile Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open architecture for network security, including standard protocols for endpoint assessment and remediation. The Endpoint Compliance Profile (ECP) builds on the TNC protocols and interfaces to determine the compliance status of any type of endpoint on a network.

December 2014 | Specifications | Add to Briefcase

icon

TNC IF-IMV Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. This security assessment of each endpoint is performed using a set of asserted integrity measurements covering aspects of the operational environment of the endpoint.

December 2014 | Specifications | Add to Briefcase

icon

TNC IF-MAP Metadata for ICS Security

The purpose of this specification is to facilitate the deployment, management, and protection of large-scale industrial control systems by creating virtual layer 2 and/or layer-3 overlay networks on top of standard shared IP network infrastructure—particularly (though not necessarily) TNC compliant IP network infrastructure.

September 2014 | Specifications | Add to Briefcase

icon

TNC MAP Content Authorization

This Trusted Network Connect Working Group (TNC) specification provides a standard model for controlling what operations MAP Clients can execute upon the content of a MAP Server.

June 2014 | Specifications | Add to Briefcase

icon

TNC IF-M: TLV Binding Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure.

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification

Trusted Network Connect (TNC) is a working group within the Trusted Computing Group (TCG). TNC is defining an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Part of the TNC architecture is IF-T, a standard for mapping the communications between TNC Clients and TNC Servers onto existing protocols. This document defines and specifies IF-T.

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-TNCCS Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure.

May 2014 | Specifications | Add to Briefcase

icon

Registry

This page includes all registries published by TCG.

April 2014 | Specifications | Add to Briefcase