On Tue, Jul 16, 2024 at 08:57:14AM +0900, Damien Le Moal wrote: > Initially, we can certainly treat them like that. But eventually, we > may need something more as CC VMs access to storage has to be > trusted too and so will require both HBA and the device to be > trusted. For the TDISP handling, I am however not sure how that > should looks like (is it the HBA or the storage device secrets that > are used, both ?). As I said, I have not spent any time yet thinking > about that use case. My guess for CC VM's is you do both.