| CPC G06F 21/72 (2013.01) | 25 Claims |

|
1. A computer-implemented method for a policy-based association of a hardware security module (HSM) with a secure guest in a confidential computing environment, the method comprising:
maintaining, by a trusted firmware, a binding between the secure guest and an HSM, wherein the binding enables the secure guest to send only non-sensitive requests to the HSM;
maintaining, by the trusted firmware, for the secure guest, a pair of a secret and a secret name;
submitting, by the secure guest via the trusted firmware, a query to the bound HSM for obtaining HSM configuration data; and
upon determining, by the secure guest, that the obtained HSM configuration data match a policy rule available to the secure guest, wherein the policy rule associates the HSM configuration data with the secret name, requesting, by the secure guest from the trusted firmware, to associate the secret from the pair of secret and the secret name with the bound HSM, thereby triggering that the trusted firmware allows the secure guest to submit a sensitive crypto-request to the bound and associated HSM.
|