Cryptographic proof that a device or platform meets security requirements. Used to verify device identity and integrity before granting access.