August 3, 2020 at 12:00 am
Comments posted to this topic are about the item Confidential VMs
Follow me on Twitter: http://www.twitter.com/way0utwest
Forum Etiquette: How to post data/code on a forum to get the best help
My Blog: www.voiceofthedba.com
August 3, 2020 at 7:33 am
Are you talking about hacking the VM from the physical host?
At a previous place of work we looked at whether storage used by one VM could be accessible unintentionally after the VM was destroyed. The conclusion we reached was encrypting the storage and making sure the means of decryption died with the VM would be as much as we could do.
August 3, 2020 at 2:23 pm
Either from the host or from another host, probing around memory on the machine.
Follow me on Twitter: http://www.twitter.com/way0utwest
Forum Etiquette: How to post data/code on a forum to get the best help
My Blog: www.voiceofthedba.com
Viewing 3 posts - 1 through 2 (of 2 total)
You must be logged in to reply to this topic. Login to reply