menu
arrow_back

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

30 分钟 7 个积分

GSP424

Google Cloud Self-Paced Labs

Overview

In this lab, you build a simple example enclave. The example demonstrates initializing an enclave, passing arguments to code running inside the enclave, encrypting those arguments inside the enclave, and returning the processed results. Even though this is a very simple example, it demonstrates the basic functionality provided by Asylo and the steps required to utilize that functionality.

What you'll do

  • Create a VM

  • Use an Asylo image to configure a Docker container

  • Encrypt your first message using an enclave application

加入 Qwiklabs 即可阅读本实验的剩余内容…以及更多精彩内容!

  • 获取对“Google Cloud Console”的临时访问权限。
  • 200 多项实验,从入门级实验到高级实验,应有尽有。
  • 内容短小精悍,便于您按照自己的节奏进行学习。
加入以开始此实验