menu
arrow_back

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

Using Asylo to Protect Secret Data from an Attacker with Root Privileges

30 minutes 7 积分

GSP424

Google Cloud Self-Paced Labs

Overview

In this lab, you build a simple example enclave. The example demonstrates initializing an enclave, passing arguments to code running inside the enclave, encrypting those arguments inside the enclave, and returning the processed results. Even though this is a very simple example, it demonstrates the basic functionality provided by Asylo and the steps required to utilize that functionality.

What you'll do

  • Create a VM

  • Use an Asylo image to configure a Docker container

  • Encrypt your first message using an enclave application

Join Qwiklabs to read the rest of this lab...and more!

  • Get temporary access to the Google Cloud Console.
  • Over 200 labs from beginner to advanced levels.
  • Bite-sized so you can learn at your own pace.
Join to Start This Lab