Running Secure Server Software on Insecure Hardware Without Parachute
slideshare.netThis is a really interesting perspective. THe most important secret you have to manage is often the private key used for TLS, but in usual architectures, it must be present on all of your front servers.
This is a good way to compartmentalize the system, for a very small cost in performance.
I can't read a single word on that slide. Someone have the text?
In case anyone tries to download the PDF and work from there: the embedded image appears to be low resolution raster, so that doesn't work either :(