Why Enclaves are Taking over the Security World

8-9-9

Cloud applications must trust that the accuracy and security of the cloud infrastructure, and associated code, will ensure their classification and uprightness. For example, most of our banks host our transaction data in the cloud. What if the infrastructure itself is compromised, or a hidden gateway in the OS/hypervisor is discovered that could compromise the application’s security or control its state? If that were to happen, the entire security of any sensitive data could be compromised.

Click here to view original webpage at www.infosecurity-magazine.com

Categories:

Your e-mail address will not be published.
Required fields are marked*