Guard against non-secure partitions and files on disk
You have two options for sending your encrypted boot image to the cloud provider.
Procedure
Securely delete sensitive files from the unencrypted boot partition
Sensitive files include the original unencrypted kernel, RAM file system, and kernel parameter file as well as the related entries in the boot configuration. These files could potentially be used by an attacker to obtain secrets.
Use, for example, the shred command to remove these files. Then re-run the boot configuration update.