Date Published: April 28, 2020
Email Comments to:
, , , , , , ,
The foundation of any data center or edge computing security strategy should involve securing the platform on which data and workloads will be executed and accessed. The physical platform represents the first layer of a layered security approach and provides initial protections to help ensure that higher-layer security controls can be trusted. This white paper explains hardware-based security techniques and examples of technology that can improve platform security and data confidentiality for cloud data centers and edge computing.
Keywords confidential computing; container; hardware-enabled security; hardware security module (HSM); secure enclave; trusted execution environment (TEE); trusted platform module (TPM); virtualization
Identification and Authentication;
System and Information Integrity;