Ensure that the Secure Boot feature is enabled for your Oracle Cloud Infrastructure (OCI) compute instances in order to protect them against malware and rootkits. Secure Boot helps ensure that the system runs only authentic software by verifying the digital signature of all boot components, and halts the boot process if the signature verification fails. Secure Boot is disabled by default because of the third-party unsigned kernel modules that can't be loaded when the feature is enabled. If you don't use third-party unsigned kernel modules, it is highly recommended to enable Secure Boot for your OCI compute instances.
Enabling Secure Boot for shielded OCI compute instances enhances security by ensuring that only authorized software is executed. This protects against boot-level and kernel-level malware, including rootkits, thereby strengthening the overall security of your OCI compute workloads.
Audit
To determine if your shielded OCI compute instances are protected with Secure Boot, perform the following operations:
Remediation / Resolution
To enable the Secure Boot feature for your Oracle Cloud Infrastructure (OCI) compute instances, you must re-create your instances by performing the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Overview of the Compute Service
- Shielded Instances
- Creating an Instance
- Oracle Cloud Infrastructure CLI Documentation
- Compartment list
- Instance list
- Instance get
- Instance launch