menu
arrow_back

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

search share Partecipa Accedi

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

30 minuti 7 crediti

GSP424

Google Cloud Self-Paced Labs

Overview

In this lab, you build a simple example enclave. The example demonstrates initializing an enclave, passing arguments to code running inside the enclave, encrypting those arguments inside the enclave, and returning the processed results. Even though this is a very simple example, it demonstrates the basic functionality provided by Asylo and the steps required to utilize that functionality.

What you'll do

  • Create a VM

  • Use an Asylo image to configure a Docker container

  • Encrypt your first message using an enclave application

Crea un account Qwiklabs per leggere il resto del lab e tanto altro ancora.

  • Acquisisci accesso temporaneo a Google Cloud Console.
  • Oltre 200 lab dal livello iniziale a quelli più avanzati.
  • Corsi brevi per apprendere secondo i tuoi ritmi.
Crea un account per iniziare questo lab