Recipe - Robust Cloud Platform

Since modern crypto schemes are highly effective, attackers use methods of cyber exploitation to compromise the involved software stack and obtain either cleartext data or sensitive key material directly at the source, essentially bypassing the strong security guarantees provided by using encryption.

This recipe consists of primitives designed to tackle the issue from three angles: vulnerability discovery, attack surface reduction and software hardening.

Complementing each other, they mitigate the risk of compromise significantly, leading to cloud platforms that are robust against cyber exploitation.