Speculative execution control

Security vulnerabilities use speculative execution to perform side-channel information disclosure attacks. You can use the speculative execution control to control speculative execution at a system-level to meet your individual security standards.

About this task

You can set the speculative execution control only when the system is in stand-by state. To select the required speculative execution control for your system, complete the following steps:

Procedure

  1. On the ASMI Welcome pane, specify your user ID and password, and click Log In.
  2. In the navigation area, expand System Configuration > Speculative Execution Control.
  3. Select one of the following options:
    • Speculative execution controls to mitigate user-to-kernel and user-to-user side-channel attacks: To mitigate exposures of the hypervisor, operating systems, and user application data to untrusted code.
    • Speculative execution controls to mitigate user-to-kernel side-channel attacks: To mitigate against the threat of lower privileged code accessing operating system secrets.
    • Speculative execution fully enabled: For systems where the hypervisor, operating system, and applications can be fully trusted.
  4. Click Save Settings to save the changes.