AMD SEV-SNP encryption at rest

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello folks,
I’m exploring the capabilities of the AMD SEV-SNP platform for a TEE implementation that will handle and store secret data. 

This data should be tied to a single guest, that is no other guest that boots with the same kernel/initrd/cmdline - in the form of a UKI - should be able to decrypt it.

I have a prototype that encrypts the boot disk with a key derived from the VCEK, but a different guest is able to derive the same key provided it boots either the same UKI. 

The key has been derived with the snpguest tool developed by the virtee project. 

Does anybody have experience with encryption at rest with the AMD SEV SNP platform?

I understand that it’s possible to inject secrets into a SEV VM at creation time, but documentation is scarce on that front. 

Thank you




[Index of Archives]     [Virt Tools]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux