This is a short workshop on how to use PARSEC plugin in AWS Greengrass v2 Nucleaus to achieve native security across device hardware Before you begin you should be family of both PARSEC and AWS Greengrass, have at least deployed both and understand the use case of both technologies, we recommend the following to become familur
- AWS Greengrass V2 Workshop
- Parsec Walkthorugh with
Located in this workshop is a "out of the box" demo setup which build and deploys the complete solution from the workshop learning steps, it is used as both a learning guide and short example when demonstrating the use of Parsec with AWS Greengrass
To get started you will need the following, an aarch64 or x86 device or your local computer, an active AWS account and your API credentials, Github access configurated locally The demo.sh file will do the following
- Prepare Git and gitsubmodule (for sourcing the Java client, Greengrass Parsec plugin and build them )
- Build the docker containers that package in, AWS Greengrass, Parsec service and intermidate steps
If you don't have hardware at hand, but still would like to test on an embedded device, then the ARM Hardware lab hosted by MiniNodes can help more info can be found here: https://github.com/WorksOnArm/mininodes-arm-edge
Tested on the following
- Apple M1 laptop (OSX Monterey 12.1)
- Intel based x86 workstation (test on Ubuntu, Fedora and ArchLinux)
- Solid-Run MACCHIATOBin ARMADA 8040 (Cortex-A72)
- Solid-Run Honeycomb LXK2 NXP (Cortex-A72)
- Thundercomm RB5 5G development kit /w Qualcomm QRB5165 Snapdragon QRB5165 (Cortex-A)
TPM's currently being implemented as part of this workshop
- 96boards Secure96 TPM
- Qualcomm SPU240 HW RoT / SPU (WIP)
- EDK II UEFI SoftTPM (new concept)
Example of 3 screens, PArsec Service, Greengrass Local Debug Console showing
Companies and Individusl that have contributed and participated in building this workshop