691691 system administrators, or system-level software can view or modify
692692 data in use.
693693 </para >
694- <sect2 xml : id =" _trusted_execution_environment_tee " >
694+ <sect2 xml : id =" trusted-execution-environment-tee " >
695695 <title >Trusted Execution Environment (TEE)</title >
696696 <para >
697697 At the heart of confidential computing is the Trusted Execution Environment (TEE).
728728 </varlistentry >
729729 </variablelist >
730730 </sect2 >
731- <sect2 xml : id =" _key_concepts_on_aws " >
731+ <sect2 xml : id =" key-concepts-on-aws " >
732732 <title >Key Concepts on AWS</title >
733733 <para >
734734 AWS implements the TEE concepts through a combination of Nitro
735735 Trusted Platform Module (TPM) technology, specialized OS images,
736736 and Nitro Enclaves.
737737 </para >
738- <sect3 xml : id =" _isolation_on_aws " >
738+ <sect3 xml : id =" isolation-on-aws " >
739739 <title >Isolation on AWS</title >
740740 <para >
741741 Isolation is achieved using images that provide an overlay-based read-only system.
744744 remotely accessible to minimize the attack surface.
745745 </para >
746746 </sect3 >
747- <sect3 xml : id =" _attestation_on_aws " >
747+ <sect3 xml : id =" attestation-on-aws " >
748748 <title >Attestation on AWS</title >
749749 <para >
750750 The image boots via a PCR-measured Unified Kernel Image (UKI) containing the kernel,
763763 </listitem >
764764 </itemizedlist >
765765 </sect3 >
766- <sect3 xml : id =" _memory_encryption_and_nitro_enclaves " >
766+ <sect3 xml : id =" memory-encryption-and-nitro-enclaves " >
767767 <title >Memory Encryption and Nitro Enclaves</title >
768768 <para >
769769 While the base instance runs in overlayfs mode (writing to memory only),
777777 </para >
778778 </sect3 >
779779 </sect2 >
780- <sect2 xml : id =" _practical_guide_deploying_attestable_images " >
780+ <sect2 xml : id =" practical-guide-deploying-attestable-images " >
781781 <title >Practical Guide: Deploying Attestable Images</title >
782- <sect3 xml : id =" _1_fetch_and_register_the_image " >
782+ <sect3 xml : id =" fetch-and-register-the-image " >
783783 <title >1. Fetch and Register the Image</title >
784784 <para >
785785 To start, you need an attestable image. For example, a SUSE Linux
809809 </para >
810810 </important >
811811 </sect3 >
812- <sect3 xml : id =" _2_pcr_measurements " >
812+ <sect3 xml : id =" pcr-measurements " >
813813 <title >2. PCR Measurements</title >
814814 <para >
815815 Before launching, download the precomputed PCR measurements:
821821 instance.
822822 </para >
823823 </sect3 >
824- <sect3 xml : id =" _3_launching_the_instance " >
824+ <sect3 xml : id =" launching-the-instance " >
825825 <title >3. Launching the Instance</title >
826826 <para >
827827 Select an instance type that supports Nitro TPM and Enclaves (e.g.,
830830 is explicitly enabled.
831831 </para >
832832 </sect3 >
833- <sect3 xml : id =" _4_verifying_the_tee " >
833+ <sect3 xml : id =" verifying-the-tee " >
834834 <title >4. Verifying the TEE</title >
835835 <para >
836836 Once logged into the instance, you can generate an attestation
@@ -860,7 +860,7 @@ $ show-nitrotpm-pcrs
860860 </itemizedlist >
861861 </sect3 >
862862 </sect2 >
863- <sect2 xml : id =" _managing_the_enclave_workload " >
863+ <sect2 xml : id =" managing-the-enclave-workload " >
864864 <title >Managing the Enclave Workload</title >
865865 <para >
866866 The workload itself is packaged as an AWS Enclave Image (<literal >.eif</literal >)
@@ -875,7 +875,7 @@ $ show-nitrotpm-pcrs
875875 is not meant to be a real-world application but serves as a demonstration of how
876876 to build and run an enclave that can attest its integrity.
877877 </para >
878- <sect3 xml : id =" _running_the_enclave " >
878+ <sect3 xml : id =" running-the-enclave " >
879879 <title >Running the Enclave</title >
880880 <para >
881881 Use the <literal >nitro-cli</literal > tool to launch your workload:
@@ -888,7 +888,7 @@ $ pushd /data $ nitro-cli run-enclave \
888888$ nitro-cli describe-enclaves
889889 </programlisting >
890890 </sect3 >
891- <sect3 xml : id =" _enclave_attestation " >
891+ <sect3 xml : id =" enclave-attestation " >
892892 <title >Enclave Attestation</title >
893893 <para >
894894 To verify the enclave's integrity, connect to it via <literal >vsock</literal >:
@@ -911,7 +911,7 @@ $ vsock_client Enclave-CID
911911 </itemizedlist >
912912 </sect3 >
913913 </sect2 >
914- <sect2 xml : id =" _future_directions_for_suse " >
914+ <sect2 xml : id =" future-directions-for-suse " >
915915 <title >Future Directions for SUSE</title >
916916 <para >
917917 Efforts are underway to deepen SUSE support for AWS
0 commit comments