Step-by-Step Configuration Guide: Trusted Compute Pools in Red Hat Enterprise Linux* OpenStack* Platform

IDC recently reported that 70 percent of survey respondents identified concerns about security as one of their top three challenges or obstacles to implementing cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role.

Intel and Red Hat have collaborated closely to enable those mechanisms in Red Hat Enterprise Linux* OpenStack Platform running on Intel® architecture. Clouds based on this solution stack take advantage of a combination of hardware-based and software-based mechanisms to help ensure that cloud-based execution environments remain free of intrusion or tampering. 

This configuration guide provides background and step-by-step procedures for installing and configuring the hardware and software that underlie these mechanisms.  

For more complete information about compiler optimizations, see our Optimization Notice.