Rate This Document
Findability
Accuracy
Completeness
Readability

Virtualization Deployment

In virtualization deployment scenarios, the intrinsic cryptographic module TA can be deployed on VMs and can be physically isolated from the key space on the host. This solution allows the key management tool to be executed independently on VMs.

Figure 1 Virtualization deployment architecture