Security vulnerabilities use speculative execution to perform side-channel information
disclosure attacks. You can use the speculative execution control to control speculative execution
at a system-level to meet your individual security standards.
About this task
You can set the speculative execution control only when the system is in
stand-by state. To select the required speculative execution control for your
system, complete the following steps:
Procedure
-
On the ASMI Welcome pane, specify your user ID and password, and click Log
In.
-
In the navigation area, expand .
-
Select one of the following options:
- Speculative execution controls to mitigate user-to-kernel and user-to-user
side-channel attacks: To mitigate exposures of the hypervisor, operating systems, and
user application data to untrusted code.
- Speculative execution controls to mitigate user-to-kernel side-channel
attacks: To mitigate against the threat of lower privileged code accessing operating
system secrets.
- Speculative execution fully enabled: For systems where the
hypervisor, operating system, and applications can be fully trusted.
-
Click Save Settings to save the changes.