A Primer on Confidential Computing
Pradeep Menon
Creating impact through Technology | AI Technologist and Futurist | Blogger | Public Speaker | Published Author | Active Startup Mentor | Board Member
The unknown risk, however minuscule, is perceived as a more significant threat than the known one.
This quote epitomizes the critical challenge with cloud adoption. According to a study from Statista, security-related risks are a significant barrier to cloud adoption for more than 50% of the surveyors. Some reservations are not unfounded, especially when porting sensitive data into the cloud. The reservations are genuine. A data breach, however minor, is enormous damage to an organization’s reputation.
However, with the ever-innovating world of cloud computing, these concerns are slowly being allayed. Confidential Computing is one such upcoming technology that promises to absolutely secure data.
The preceding diagram shows Gartner's data security hype cycle (2022). Confidential Computing is just at the innovation trigger stage. Its developments are promising, and it will take 5-10years for it to reach its potential. But, if it can reach its potential, I'm confident it can change the cloud computing landscape altogether.
This blog series will explore the concept of Confidential Computing in detail. The first blog of this series provides an overview of confidential Computing. Then, we will explore this technology's what, why, and how and discuss its implications.
What is confidential Computing?
The goal of confidential Computing is simple.
To protect data when it is in its most vulnerable state, i.e., when the data is in use.
Let us explore this concept in a little more detail. First, data exists in three states.
Confidential Computing protects the data in use.
Let us now understand how confidential Computing protects the data in use.
How does confidential Computing work?
To understand the workings of confidential Computing, let's first discuss its key concepts.
Trusted Execution Environments
Confidential Computing encrypts data in use by creating Trusted Execution Environments (TEEs). TEEs, as defined by the Confidential Computing Consortium (CCC), is an environment that provides a level of assurance in the following dimensions:
The utmost security that TEE can offer is at the hardware level. The hardware-based TEEs are available using Intel SGX (Software Guard Extensions) and ARM TrustZone.
Trusted Computing Base (TCB) and Potential Attack Surface
Before we understand how SGX-enabled hardware-based TEEs work, let us first look into the workings of a traditional computing environment.
The preceding diagram shows a typical computing environment. It has the following layers:
The TCB is proportional to the Potential Attack Surface.
领英推荐
More, the TCB implies more potential attach surface, suggesting lower security.
In a traditional computing environment, the assumption is that the entire layer from the host to the application is the Trusted Computing Base (TCB). The TCB assumes that anything in its gamut provides a trusted environment for operations.
The malicious actors exploit this assumption to access code and data they are not supposed to.
A larger TCB means that if a malicious actor compromises an App, it can find its way to the OS, the hypervisor, the CPU, and the host. In a cloud computing world, the cloud platform provider has access to the layers until the Operating Systems. This access is also a cause for concern for many regulated industries like finance and healthcare.
Let us now discuss how an SGX-enabled confidential computing environment looks. The diagram below shows a confidential computing environment.
The diagram shows that a confidential computing environment significantly reduces the potential attack surface. In an Intel SGX-enabled environment, the potential attack surface is reduced by creating SGX enclaves.
Enclaves
One of the important concepts in hardware-based confidential Computing is Enclaves. The following diagram depicts the enclaves.
The premise is simple. An enclave is an area within the CPU that is the trusted computing base. The CPU carves out a special encrypted zone within itself—this zone, a.k.a. enclaves, and inaccessible to anyone. The data in use needs to be decrypted within the enclave, and only the code authorized to access this data will get access to it. No one else, including the cloud platform provider, gets access to the enclave as they are not privy to the access keys to the enclaves.
The enclaves reduce the TCB to a portion of the RAM and thus reduce the attack surface.
Another critical concept in confidential Computing is the process of Attestation. Let us now discuss this concept.
Attestation
As we have discussed, Trusted Execution Environments (TEE) runs the computation to provide data confidentiality, data integrity, and code integrity. However, how does one ensure that the TEE provides it?
The process of Attestation provides this assurance. The process of Attestation ensures that the TEE is running the code as it is expected to run, and the code is being run in the configuration the code was intended to run. The process of Attestation verifies the trustworthiness of the platform and the integrity of the code it runs. There are different topologies used for Attestation.
The following diagram describes an attestation topology called the passport model, which focuses on the process and the key actors involved.
There are three actors involved in the attestation process.
Now that we have covered the fundamental concepts of Confidential Computing let us discuss its usage scenarios.
Confidential Computing Usage Scenarios
As one can imagine, an upcoming concept like confidential Computing has a gamut of potential where it can make a real impact. I will abstract three usage scenarios that confidential Computing is well positioned to address.
Conclusion
This first blog of the series provides a primer on Confidential Computing, a nascent technology promising immense potential. The following blog of this series will deep-dive into the workings of Intel’s SGX-enabled processors and how they enable Confidential Computing.
Founder at Innovation IT Solutions
2 年Kudos to you Bro. So informative and well written, very useful !!
This was super useful for me
Super useful - learned a ton!
Chief Technology Officer | Ex-Microsoft | Microsoft MVP Reconnect | Digital MBA
2 年Thanks for sharing! Great article, it's one on my mind to bring this into our offering.
Automotive | Energy | Manufacturing | Cloud | Data & AI
2 年Great information Pradeep Menon