Revoking an Encryption Key Parent topic

Without scheduled integrity checking enabled, SecureCloud evaluates a machine image instance based on the policy rules for the device in question. If the instance meets the criteria of the device policy rules, then SecureCloud permits the instance to access the device. If the instance fails to meet the criteria specified by the device policy rules, then SecureCloud denies device access to the requesting instance. In both of these cases, SecureCloud evaluates the instance only once during the instance session. If the instance is later in compliance with the device policy rules, the instance will not have another opportunity to request the device key.
With scheduled integrity checking enabled in a device policy, SecureCloud works with the Integrity Check Module (ICM) of the Runtime Agent to evaluate an instance multiple times during the entire instance session. Therefore, if SecureCloud revokes an encryption key, you have an opportunity to make the instance compliant with the policy rules and receive the encryption key back. But even before SecureCloud revokes the encryption key of an offending instance, the application can provide a grace period where the key is not revoked for a time and you are warned that the instance is in violation of the device policy rules.