Pervasive Encryption: A Guide to Protecting Your Data-At-Rest Using dm-crypt With Protected Keys
Project and Program:
Linux & VM,
Linux
Tags:
Proceedings ,
SHARE Phoenix 2019 ,
2019
In this presentation we show to set up your Linux on Z system to protect your data-at rest in a way that the keys to protect your data are never stored in your systems memory and therefore cannot be stolen or exposed in a memory dump. While providing a walkthrough of the set-up of an encrypted logical volume, we will discuss different dm-crypt formats (plain and LUKS2) and key management.-Reinhard Buendgen-IBM Corporation
Back to Proceedings File Library