Pervasive Encryption: A Guide to Protecting Your Data-At-Rest Using dm-crypt With Protected Keys
				Project and Program: 
Linux & VM, 
Linux
				Tags: 
Proceedings, 
SHARE Phoenix 2019, 
2019
		
		
		
			
		In this presentation we show to set up your Linux on Z system to protect your data-at rest in a way that the keys to protect your data are never stored in your systems memory and therefore cannot be stolen or exposed in a memory dump. While providing a walkthrough of the set-up of an encrypted logical volume, we will discuss different dm-crypt formats (plain and LUKS2) and key management.-Reinhard Buendgen-IBM Corporation
		
		
		
		
		
		
	
 Back to Proceedings File Library