Protecting Data In-use With Secure Execution
Project and Program:
Linux & VM,
Linux
Tags:
Proceedings ,
SHARE Virtual 2020 ,
2020
Many workload owners refuse to deploy sensitive workloads in a cloud because it is still possible for HW operators or privileged hypervisor code or administrators to inspect or even modify sensitive data in the memory of a hosted guest system.
A new framework on IBM z15 and LinuxONE III servers helps, because it technically disables the HW management console (SE/HMC) or a KVM hypervisor to inspect or change memory or state of a guest thus making an IBM Z secure during runtime of an application and makes it a trustworthy platform to host sensitive workloads. In this presentation we will present the new trust model introduced, describe the attack vector protects, give an overview of the security technology used and describe the life cycle of a secure guest.-Reinhard Buendgen-IBM Corporation
Back to Proceedings File Library