A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this provider?
To protect datain use(within memory), the provider must implementhardware-level memory encryptionandtrusted execution environments(secure enclaves), which protect against cold boot attacks, memory scraping, and unauthorized access.
NIST SP 800-207A (Hardware-Enabled Security: Enclaves):
''Trusted execution environments and memory encryption mechanisms help ensure that data remains protected even when systems are compromised at lower levels.''
This is amodern cloud security best practiceespecially useful forconfidential computingenvironments.
WGU Course Alignment:
Domain:System Security Engineering / Cryptography
Topic:Protect data in use with hardware-based encryption and enclaves
Tammara
4 days agoChana
10 days agoElouise
15 days agoVilma
20 days agoKeena
25 days agoJame
1 month agoRene
1 month ago