You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-veraison/_index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ minutes_to_complete: 30
7
7
who_is_this_for: This Learning Path is for developers who would like to learn about attestation in confidential computing, using Arm’s Confidential Computing Architecture (CCA).
8
8
9
9
learning_objectives:
10
-
- Describe the importance of attestation for confidential computing.
10
+
- Describe the importance of attestation in confidential computing.
11
11
- Understand what a CCA attestation token is, and describe its format.
12
12
- Inspect the contents of a CCA attestation token using command-line tools.
13
13
- Use an attestation verification service to evaluate a CCA attestation token.
14
-
- Understand the purpose of the Open source Veraison project.
14
+
- Understand the purpose of the Open-Source Veraison project.
15
15
16
16
17
17
prerequisites:
18
-
- An Arm-based or x86 computer running Ubuntu. You can use a server instance from the cloud service provider of your choice.
18
+
- An Arm-based or x86 computer running Ubuntu. You can use a server instance from a cloud service provider of your choice.
tar -C /usr/local -xzf go1.23.3.linux-$(dpkg --print-architecture).tar.gz
20
20
```
21
21
22
-
Export the installation path and add it to your `$PATH environment` variable.
22
+
Export the installation path and add it to your `$PATH environment` variable:
23
23
24
24
```bash
25
25
export PATH=$PATH:/usr/local/go/bin
@@ -56,17 +56,19 @@ Use GitHub’s download button, located on the right of the upper toolbar, to do
56
56
57
57

58
58
59
-
Place this file in the `$HOME` folder, while retaining the file name. The rest of this Learning Path uses the notation `$HOME/cca_example_token.cbor` as the file path.
59
+
Place this file in the `$HOME` folder, while retaining the file name.
60
+
61
+
The rest of this Learning Path uses the notation `$HOME/cca_example_token.cbor` as the file path.
60
62
61
63
{{% notice Note %}}
62
64
You will notice that the filename extension on the example token is `.cbor`, which also denotes the format of the data. CBOR is an acronym for Concise Binary Object Representation. You might already be familiar with JSON (the JavaScript Object Notation). JSON provides a standard way of conveying the nested structures of key-value pairs. CBOR is conceptually the same as JSON. The difference is that CBOR is a binary format, rather than a text-based format like JSON. CBOR is designed for compactness and machine-readability, but at the expense of human-readability. You can learn more about CBOR [here](https://cbor.io/).
63
65
{{% /notice %}}
64
66
65
-
## Build the EVCLI Tool
67
+
## Build the evcli tool
66
68
67
-
Now that you have downloaded the example CCA attestation token, the next step is to look inside the token and learn about the data that it contains. As the token is a binary file, you will need to use a tool to parse the file and display its contents. The tool that you will use is a command-line tool called `evcli`. Evcli is an acronym for EVidence Command Line Interface, linking with the idea that attestation tokens are used to convey evidence about realms and the platforms on which they are hosted.
69
+
Now that you have downloaded the example CCA attestation token, the next step is to look inside the token and learn about the data that it contains. As the token is a binary file, you will need to use a tool to parse the file and display its contents. The tool that you will use is a command-line tool called `evcli`.
68
70
69
-
The `evcli` tool is part of the Veraison Open-Source project, which was covered in the previous section.
71
+
`evcli` is an acronym for EVidence Command Line Interface, which goes back to the idea that attestation tokens are used to convey evidence about realms and the platforms on which they are hosted. The `evcli` tool is part of the Veraison Open-Source project, which was covered in the previous section.
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-veraison/cca-attestation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ layout: learningpathall
8
8
## Overview
9
9
Confidential computing is about protecting data in use. This protection comes from the creation of a security boundary around the computation being performed. This security boundary creates what is called a Trusted Execution Environment (TEE). The data and code that executes within the TEE is protected from the outside world. Different technologies exist for creating this secure boundary. In the case of Arm CCA, the Realm Management Extension (RME), which is part of the Armv9 Architecture for A-profile CPUs, provides the secure boundary.
10
10
11
-
A secure boundary is necessary for confidential computing, but it is not sufficient alone. There must also be a way to establish trust with the TEE, the target compute environment, that the boundary is protecting. Trusting the environment implicitly does not meet the strict definition of confidential computing. Instead, trust needs to be built by a process that is both explicit and transparent. This process is known as attestation. The role of attestation is described in the Figure 1.
11
+
A secure boundary is necessary for confidential computing, but it is not sufficient alone. There must also be a way to establish trust with the TEE, the target compute environment, that the boundary is protecting. Trusting the environment implicitly does not meet the strict definition of confidential computing. Instead, trust needs to be built by a process that is both explicit and transparent. This process is known as attestation. The role of attestation is described in Figure 1.
12
12
13
13

Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-veraison/evaluate-result.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,9 @@ weight: 7
6
6
layout: learningpathall
7
7
---
8
8
9
-
## Build the ARC Tool
9
+
## Build the arc tool
10
10
11
-
You are already familiar with the evcli tool, which you can use to process attestation tokens. There is a very similar tool called `arc`, which you can use to process attestation results. The arc tool is also part of the Veraison project.
11
+
You are already familiar with the evcli tool, which you can use to process attestation tokens. There is a very similar tool called `arc`, which you can use to process attestation results. The `arc` tool is also part of the Veraison project.
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-veraison/how-to-use.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,10 +8,10 @@ layout: learningpathall
8
8
9
9
## Highlights
10
10
11
-
Some highlights of using this Learning Path are the following:
11
+
These are some highlights of using this Learning Path:
12
12
13
-
*Practical, hands-on experience with the data formats and workflows associated with attestation, which in turn will help to provide you with a joined-up understanding of the many separate documents and specifications that exist on this topic.
13
+
*Code examples that demonstrate some of the common concepts in attestation.
14
14
15
-
*An opportunity to learn about the common concepts in attestation, supported by code examples as a demonstration.
15
+
*Practical, hands-on experience with the data formats and workflows associated with attestation, which help to provide you with a joined-up understanding of the many separate documents and specifications that exist on this topic.
16
16
17
-
*In advance of the practical sections, a chance to read theoretical overviews of both CCA Attestation and Veraison to help you grasp the basic concepts before progressing to the practical sections.
17
+
*Theoretical overviews of both CCA Attestation and Veraison to help you grasp the basic concepts before progressing to the practical sections.
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-veraison/veraison.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,9 @@ layout: learningpathall
8
8
9
9
## Veraison
10
10
11
-
The tools and services that you will use in this Learning Path derive from an Open-Source project called [Veraison](https://github.com/veraison). Veraison is a project that was founded within Arm but has since been donated to the [Confidential Computing Consortium](https://confidentialcomputing.io/) as an ongoing community project with a growing number of contributors from other organizations. Veraison addresses the verification aspect of attestation. It provides reusable tools and components that can be deployed in the construction of verification services or libraries.
11
+
The tools and services that you will use in this Learning Path derive from an Open-Source project called [Veraison](https://github.com/veraison).
12
+
13
+
Veraison is a project that was founded within Arm but has since been donated to the [Confidential Computing Consortium](https://confidentialcomputing.io/) as an ongoing community project with a growing number of contributors from other organizations. Veraison addresses the verification aspect of attestation. It provides reusable tools and components that can be deployed in the construction of verification services or libraries.
12
14
13
15
Confidential computing is a new, and fast-growing industry. There are many stakeholders, including:
0 commit comments