Microsoft Pluton
(Chip-to-Cloud Security)
See AMD Customer Data Sheet here
Microsoft Pluton is a dedicated security processor integrated into modern AMD Ryzen PRO CPUs, starting with the Ryzen 6000 series and newer platforms. Designed by Microsoft and built directly onto the CPU die, Pluton provides a hardware-based root of trust, secure identity, attestation, and cryptographic services that strengthen chip-to-cloud security for Windows devices.
Originating from technology used in Xbox and Azure Sphere, Pluton replaces or complements the traditional Trusted Platform Module (TPM). It fully supports TPM 2.0 capabilities such as key generation, secure storage, and attestation, while extending these with additional protections like secure credential storage and hardware-backed identity. Unlike a discrete TPM or firmware TPM (fTPM), Pluton keeps sensitive keys and data entirely within the CPU package, eliminating external interfaces that attackers could target.
On AMD platforms, Pluton coexists with AMD’s Platform Security Processor (PSP): the PSP establishes the silicon root of trust for the system firmware, while Pluton serves as the operating system’s root of trust. When enabled in the system BIOS, Pluton replaces the fTPM as the active TPM provider in Windows, integrating seamlessly with Windows 11 features such as BitLocker (for encryption key protection), Windows Hello (for credential storage), and enterprise device attestation through services like Intune Conditional Access.
Because it’s built into the CPU rather than as a separate chip, Pluton benefits from stronger isolation and simplified updates. Its firmware is serviced through Windows Update, ensuring ongoing improvements and integration with the OS security model. Microsoft is continuing to evolve Pluton—beginning in 2024—with the introduction of Rust-based firmware for enhanced memory safety and reliability.
Microsoft explicitly supports two deployment patterns: using Pluton as the TPM, or using a separate TPM while Pluton is available for other security functions. This design gives OEMs and customers flexibility to decide whether Pluton or a traditional TPM should be the primary root‑of‑trust, rather than forcing a single model.
For enterprises and users alike, Pluton strengthens hardware-rooted identity and device integrity without impacting performance, providing a foundation for secure, manageable systems from silicon to cloud.
Intel, however, integrates Pluton capabilities into its existing Platform Security Technology (PST) or Intel Partner Security Engine (IPSE) within Core Ultra Series 2 processors, rather than as a separate on-die Pluton block—this is a software/hardware hybrid leveraging Intel's firmware-based security stack, not a standalone physical processor like AMD's. Qualcomm adapts it similarly to their existing Secure Processing Unit. Intel's implementation maintains hardware isolation within the SoC, though AMD's dedicated die integration offers arguably tighter physical boundaries.
TPM (Trusted Platform Module)
- Dedicated hardware-based security functions that help protect sensitive data such as encryption keys, passwords, and digital certificates.
- open standard/open source ecosystem
- Modern systems include firmware TPM on the CPU (called fTPM on AMD, or PTT on intel), though older systems had a discrete TPM module on the motherboard.
Discrete TPM (dTPM) — Physical Chip on Motherboard
Pros - Dedicated hardware, formally validated. - Keys stay isolated from CPU or firmware compromises.
Cons - Vulnerable to physical attacks on the bus (SPI, I²C, LPC). - Can be removed, intercepted, or probed with specialized hardware. - OEM wiring errors can introduce weaknesses.
Firmware TPM (fTPM / Intel PTT) — Inside CPU Firmware
Pros - No external bus → eliminates bus-sniffing or chip-removal attacks. - Lower cost, universal.
Cons - Runs inside the PSP (AMD) or ME/PCH (Intel) firmware. - Vulnerable to firmware exploits. - If CPU firmware is compromised, TPM security can be bypassed (Spectre and Meltdown vulnerabilities, Platypus attack on intel)
Which is “more secure”? - Against physical tampering: firmware TPM is more secure - Against firmware-level attacks: discrete TPM is more secure - In practice: it depends on the attacker model
For more infomation see Microsoft's Documentation on Pluton as a TPM
Pluton vs. Firmware TPM (fTPM/PTT)
Strengths of Pluton over fTPM
- Stronger isolation:
Pluton is a dedicated hardware security block inside the CPU silicon, while fTPM runs inside general-purpose firmware (PSP/ME), making fTPM more exposed to firmware bugs or malicious modifications.
- Better protection from firmware-level attacks:
Firmware TPM depends on the CPU firmware’s security; if the PSP/ME firmware is compromised, the fTPM can often be bypassed.
Pluton’s root of trust is in silicon, not firmware, so a firmware compromise does not break Pluton.
- Physically tamper-resistant:
Pluton’s secure hardware cannot be probed or read externally; fTPM is only “logically separated” but not hardware-hardened in the same way.
Weaknesses of Pluton compared to fTPM
- More integrated with the platform vendor (Microsoft):
Updates and policies are funneled through the Microsoft ecosystem, which some people view as more centralized or more “locked-down.”
- Newer and less battle-tested:
fTPM has been around much longer; Pluton is relatively new and still rolling out across OEMs. This is a double edge sword however as that can mean more time to uncover exploits.
Pluton vs. Discrete TPM (dTPM)
Strengths of Pluton over dTPM
- No external bus to attack:
Discrete TPM chips are connected to the CPU over LPC/I²C/SPI buses, which can be sniffed, intercepted, or physically manipulated.
Pluton is fully on-die, with no exposed communication lines.
- Physically harder to remove or tamper with:
dTPM chips can be:
- de-soldered
- replaced
- probed
Pluton cannot — it is part of the CPU silicon itself.
- Uniform security implementation:
dTPMs vary in quality and configuration by vendor.
Pluton is standardized across systems.
Weaknesses of Pluton compared to dTPM
- Less hardware separation:
A discrete TPM is physically separate, so compromises to CPU firmware may not affect the dTPM.
Pluton is inside the CPU, so although isolated, it is part of the same silicon ecosystem.
- Potentially fewer user-choice/upgrade options:
dTPM can be swapped or disabled independently; Pluton cannot.
Pluton’s Updateability
Is not a weekness in the same way firmware TPM is vulnerable. - Pluton updates must be cryptographically signed using keys burned into its ROM. - System firmware or OS cannot modify Pluton’s code. - A compromised BIOS/UEFI/PSP cannot rewrite Pluton.
In contrast: - fTPM is part of BIOS/PSP/ME firmware → if that firmware is compromised, the fTPM is exposed. - dTPMs are updated by motherboard vendors → sometimes insecurely handled.
Pluton’s update mechanism is designed to avoid exactly those weaknesses.
Pluton Adoption Challenges
There are several practical and political reasons why some OEMs have shipped Microsoft Pluton disabled or not used as the primary TPM, even though Microsoft positions it as a more secure, modern root-of-trust. These reasons are mostly about compatibility, control, and ecosystem maturity rather than Pluton being inherently “bad.”
Enterprise compatibility concerns
Many enterprises have mature workflows built around discrete or firmware TPMs for imaging, BitLocker provisioning, attestation, virtualization, and security baselines, and Pluton is “just another TPM” only in theory. Microsoft explicitly notes that OEMs may continue using a discrete TPM as the default while Pluton co‑exists as a security processor, which lets OEMs avoid forcing customers to revalidate tooling and policies on day one.
Lenovo publicly confirmed that 2022 ThinkPad models with AMD Ryzen 6000 would ship with Pluton present but disabled by default, with customers able to turn it on themselves, specifically to fit enterprise expectations. OEMs don’t want to ship laptops that suddenly break corporate deployment images or management processes.
Avoiding perceived Microsoft lock-in
Pluton firmware is authored, maintained, and updated by Microsoft, with updates delivered via Windows Update rather than through OEM‑specific firmware channels. This centralization of the root‑of‑trust firmware in Microsoft’s ecosystem has led to criticism in technical communities and the press that Pluton could increase Microsoft’s leverage over platform security policy, even if it remains standards‑compliant as a TPM 2.0 implementation.
Microsoft’s own documentation emphasizes that Pluton is a flexible, updatable platform for end‑to‑end security features maintained by Microsoft, which some customers interpret as a shift in control away from OEMs and towards Microsoft. Concerns about future tightening of secure boot, attestation, or OS restrictions contribute to pressure on OEMs to keep Pluton off or configurable, especially in markets that value multi‑OS flexibility.
Early stability and ecosystem issues
Early Pluton‑equipped systems focused primarily on Windows 11, and Microsoft acknowledged that Linux was not initially a supported scenario for Pluton usage even though the underlying CPUs supported Linux. Community and forum discussions raised issues about TPM behavior, boot reliability, and OS support expectations, which understandably made OEMs cautious about treating Pluton as the default TPM for broad deployments.
Microsoft’s guidance now frames Pluton as a standards‑compliant TPM 2.0 and documents its integration with Windows features like BitLocker, Windows Hello and System Guard, but this standardization and validation has taken time to mature. Until that ecosystem stabilization and tooling validation finishes in each customer segment, OEMs have rational incentives to minimize support risk by sticking with known TPM configurations as default.
Certification and regulatory requirements
Some regulated sectors require TPMs with particular certifications such as FIPS 140‑3 or Common Criteria, and organizations often write those vendor or certification requirements directly into procurement policies. Microsoft has pursued FIPS 140‑3 validation for Pluton as a cryptographic module, but currently certifications only cover a specific CPU + Firmware combination (like this example for the Ryzen 7 6850H).
Although discrete TPMs must also meet the same certifications, they are self‑contained hardware components that typically ship with a stable, rarely‑updated firmware version. OEMs can therefore source pre‑certified TPM modules (such as Infineon or Nuvoton TPM 2.0 devices) and deploy them across many motherboard designs or product SKUs without requiring new certification for each system, provided the TPM hardware and firmware remain unchanged. This separation allows TPM manufacturers and OEMs to update other system components, or even release multiple product generations, while maintaining compliance without re‑validation.