| CPC G06F 21/602 (2013.01) [G06F 9/45558 (2013.01); G06F 21/57 (2013.01); H04L 63/10 (2013.01); G06F 2009/45587 (2013.01)] | 20 Claims |

|
1. A method for data processing, comprising:
receiving, from an application associated with a tenant and at a virtual machine, a request to perform a version of a cryptographic operation for the application at the virtual machine;
determining, based at least in part on receiving the request, that the tenant is limited to using a designated set of cryptographic operations in accordance with a cryptographic operation validation policy associated with the tenant, and wherein the designated set of cryptographic operations are validated in accordance with the cryptographic operation validation policy;
identifying a designated version of the cryptographic operation, from the designated set of cryptographic operations, that corresponds to the cryptographic operation indicated by the request and is different than the version of the cryptographic operation indicated by the request, the designated version of the cryptographic operation in satisfaction of the cryptographic operation validation policy associated with the tenant;
executing the designated version of the cryptographic operation at the virtual machine; and
returning, to the application, a result of executing the designated version of the cryptographic operation.
|