How to Scale Security with a Hardware Chain of Trust

Full Article :

Linux.com - https://www.linux.com/news/how-scale-security-hardware-chain-trust

A hardware-rooted chain of trust verifies the integrity of every relevant component in the cloud platform, giving you security automation that flexibly integrates into the DevOps pipeline. A true chain of trust would start in the host chip firmware and build up through the container engine and orchestration system, securing all critical data and workloads during an application’s lifecycle.

Hardware is the ideal foundation because it is rooted in silicon, making it difficult for hackers to alter.

Leave a Comment

%d bloggers like this: