diff --git a/README.md b/README.md index 00b559aa..6bae0507 100644 --- a/README.md +++ b/README.md @@ -262,8 +262,8 @@ Kernel space: - Disable the EFI persistent storage feature which prevents the kernel from writing crash logs and other persistent data to either the UEFI variable storage or ACPI ERST backends. -- Optional - On compatible AMD CPUs enable Secure Memory Encryption (SME) to protect against - cold boot attacks and Secure Encrypted Virtualization (SEV) for further guest memory isolation. +- On compatible AMD CPUs enable Secure Memory Encryption (SME) to protect against cold boot + attacks and Secure Encrypted Virtualization (SEV) for further guest memory isolation. - Prevent runaway privileged processes from writing to block devices that are mounted by filesystems to protect against filesystem corruption and kernel crashes. diff --git a/etc/default/grub.d/40_kernel_hardening.cfg#security-misc-shared b/etc/default/grub.d/40_kernel_hardening.cfg#security-misc-shared index 4407b169..e8859028 100644 --- a/etc/default/grub.d/40_kernel_hardening.cfg#security-misc-shared +++ b/etc/default/grub.d/40_kernel_hardening.cfg#security-misc-shared @@ -299,10 +299,10 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX erst_disable" ## https://github.com/secureblue/secureblue/pull/1631#issuecomment-3655501478 ## https://forums.whonix.org/t/enable-secure-memory-encryption-sme-kernel-parameter-mem-encrypt-by-default/10393 ## -#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mem_encrypt=on" -#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev=1" -#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev_es=1" -#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev_snp=1" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mem_encrypt=on" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev=1" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev_es=1" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev_snp=1" ## Prevent processes from writing to block devices that are mounted by filesystems. ## Enhances system stability and security by protecting against runaway privileged processes.