Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM в хорошем качестве

Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM 1 день назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM

Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM Confidential Computing secures an important attack vector for sensitive workload: a provider cannot inspect or manipulate a confidential computing workload via its main memory or CPU registers. Yet confidential computing workloads are susceptible to other attacks (e.g., network attacks) like any other system. Therefore, certain workloads may require the use of a hardware security module (HSM) to protect their cryptographic keys. The usage of an HSM in a cloud gives raise to new attack vectors that need to be dealt with to establish a trustworthy relation between a virtual machine (aka guest) running in a trusted execution environment, the HSM and the cryptographic keys. The protection required goes beyond the establishment of a secure channel between the TEE and an attached device. This presentation reviews the security promises of confidential computing and HSMs, describes how to overcome the challenges of HSM usage in the cloud and finally shows how IBM Secure Execution for Linux allows to configure secure access to Crypto Express HSMs for Linux KVM guests.

Comments