In this Google Cloud Lab, you build a simple example enclave. The example demonstrates initializing an enclave, passing arguments to code running inside the enclave, encrypting those arguments inside the enclave, and returning the processed results. Even though this is a very simple example, it demonstrates the basic functionality provided by Asylo and the steps required to utilize that functionality.
Using Asylo to Protect Secret Data from an Attacker with Root PrivilegesGoogle Cloud
About this Course
We help millions of organizations empower their employees, serve their customers, and build what’s next for their businesses with innovative technology created in—and for—the cloud. Our products are engineered for security, reliability, and scalability, running the full stack from infrastructure to applications to devices and hardware. Our teams are dedicated to helping customers apply our technologies to create success.
Frequently Asked Questions
Can I preview a course before enrolling?
What will I get when I enroll?
When will I receive my Course Certificate?
Why can’t I audit this course?
Is financial aid available?
Will I earn university credit for completing the Course?
More questions? Visit the Learner Help Center.