Secure App Transactions and Sensitive Data with Cryptographic Key Encryption Protection

preview_player
Показать описание

In this video, Chris Poole with IBM, demonstrates how to deploy a secured virtual server, create a lockdown database, create an instance of IBM Cloud Hyper Protect Crypto Service and initialize its Hardware Security Module (HSM) using IBM Cloud Hyper Protect Services to ensure your data stay confidential.

Chapters
0:00 - Intro to Confidential Computing
0:50 - Secure your keys with HSM
1:20 - IBM Cloud Hyper Protect Crypto Services
1:40 - Keep Your Own Key (KYOK) & Key Ceremony
2:19 - Key Ceremony with a Smart Card
2:44 - Using Smart Cards to initialize HSM
3:42 - Create a lockdown database with IBM Cloud Hyper Protect DBaaS
4:31 - Deploy a secure virtual server with IBM Cloud Hyper Protect Virtual Servers
5:01 - Create an instance of the IBM Cloud Hyper Protect Crypto Service and initialize its HSM
6:00 - Summary

#ConfidentialComputing #Crypto #IBMCloudHyperProtectServices
Рекомендации по теме
Комментарии
Автор

2:44 Does this mean that each smartcard has a masterkey duplicate or all of the issued cards needs to be "combined" in order to "construct" a master key?

Flankymanga
join shbcf.ru