You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-computing-deployment-models.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: virtual-machines
6
6
ms.subservice: confidential-computing
7
7
ms.workload: infrastructure
8
8
ms.topic: conceptual
9
-
ms.date: 11/01/2021
9
+
ms.date: 11/03/2021
10
10
ms.author: JenCook
11
11
ms.custom: ignite-fall-2021
12
12
---
@@ -59,15 +59,15 @@ VM admins or any other app or service running inside the VM, operate beyond the
59
59
60
60
AMD SEV-SNP technology provides VM isolation from the hypervisor. The hardware-based memory integrity protection helps prevent malicious hypervisor-based attacks. The SEV-SNP model trusts the AMD Secure Processor and the VM. The model doesn't trust any other hardware and software components. Untrusted components include the BIOS, and the hypervisor on the host system.
61
61
62
-

62
+
:::image type="content" source="media/confidential-computing-deployment-models/amd-sev-snp-vm.png" alt-text="Diagram of AMD SEV-SNP VM architecture, defining trusted and untrusted components.":::
63
63
64
64
### Secure enclaves on Intel SGX
65
65
66
66
**Secure enclaves on Intel SGX** protect memory spaces inside a VM with hardware-based encryption. The security boundary of application enclaves is more restricted than confidential VMs on AMD SEV-SNP. For Intel SGX, the security boundary applies to portions of memory within a VM. Users, apps, and services running inside the Intel SGX-powered VM can't access any data and code in execution inside the enclave.
67
67
68
68
Intel SGX helps protect data in use by application isolation. By protecting selected code and data from modification, developers can partition their application into hardened enclaves or trusted execution modules to help increase application security. Entities outside the enclave can't read or write the enclave memory, whatever their permissions levels. The hypervisor or the operating system also can't obtain this access through normal OS-level calls. To call an enclave function, you have to use a new set of instructions in the Intel SGX CPUs. This process includes several protection checks.
69
69
70
-

70
+
:::image type="content" source="media/confidential-computing-deployment-models/intel-sgx-enclave.png" alt-text="Diagram of Intel SGX enclaves architecture, showing secure information inside app enclave.":::
Confidential containers support custom applications developed with any programming languages. You can also run Docker container apps off the shelf.
20
20
21
-

21
+
![Diagram of confidential container protection boundary in Kubernetes.]()
22
+
23
+
:::image type="content" source="./media/confidential-containers/sgx-confidential-container.png" alt-text="Diagram of confidential container protection boundary in Kubernetes, showing no access for admins.":::
22
24
23
25
## Enablers with Intel SGX on Azure Kubernetes Service(AKS)
24
26
25
27
To run an existing Docker container, applications on confidential computing nodes require an abstraction layer or Intel Software Guard Extensions (SGX) software to use the special CPU instruction set. Configure SGX to protect your sensitive application code. SGX creates a direct execution to the CPU to remove the guest operating system (OS), host OS, or hypervisor from the trust boundary. This step reduces the overall surface attack areas and vulnerabilities.
26
28
27
29
Azure Kubernetes Service (AKS) fully supports confidential containers. You can run existing containers confidentially on AKS.
28
30
29
-

31
+
:::image type="content" source="./media/confidential-containers/confidential-containers-deploy-steps.png" alt-text="Diagram of confidential container conversion, with new steps for enabling Intel SGX and AKS.":::
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-nodes-aks-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: agowdamsft
6
6
ms.service: container-service
7
7
ms.subservice: confidential-computing
8
8
ms.topic: overview
9
-
ms.date: 2/08/2021
9
+
ms.date: 11/03/2021
10
10
ms.author: amgowda
11
11
ms.custom: ignite-fall-2021
12
12
---
@@ -19,7 +19,7 @@ ms.custom: ignite-fall-2021
19
19
20
20
Azure Kubernetes Service (AKS) supports adding [DCsv2 confidential computing nodes](confidential-computing-enclaves.md) powered by Intel SGX. These nodes allow you to run sensitive workloads within a hardware-based trusted execution environment (TEE). TEE’s allow user-level code from containers to allocate private regions of memory to execute the code with CPU directly. These private memory regions that execute directly with CPU are called enclaves. Enclaves help protect the data confidentiality, data integrity and code integrity from other processes running on the same nodes. The Intel SGX execution model also removes the intermediate layers of Guest OS, Host OS and Hypervisor thus reducing the attack surface area. The *hardware based per container isolated execution* model in a node allows applications to directly execute with the CPU, while keeping the special block of memory encrypted per container. Confidential computing nodes with confidential containers are a great addition to your zero trust security planning and defense-in-depth container strategy.
:::image type="content" source="./media/confidential-nodes-aks-overview/sgxaksnode.png" alt-text="Graphic of AKS Confidential Compute Node, showing confidential containers with code and data secured inside.":::
Copy file name to clipboardExpand all lines: articles/confidential-computing/overview-azure-products.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: virtual-machines
6
6
ms.subservice: confidential-computing
7
7
ms.workload: infrastructure
8
8
ms.topic: overview
9
-
ms.date: 11/01/2021
9
+
ms.date: 11/03/2021
10
10
ms.author: JenCook
11
11
ms.custom: ignite-fall-2021
12
12
---
@@ -17,15 +17,15 @@ Today customers encrypt their data at rest and in transit, but not while it is i
17
17
18
18
Technologies like [Intel Software Guard Extensions](https://www.intel.com.au/content/www/au/en/architecture-and-technology/software-guard-extensions-enhanced-data-protection.html) (Intel SGX), or [AMD Secure Encrypted Virtualization](https://www.amd.com/en/processors/amd-secure-encrypted-virtualization) (SEV-SNP) are recent CPU improvements supporting confidential computing implementations. These technologies are designed as virtualization extensions and provide feature sets including memory encryption and integrity, CPU-state confidentiality and integrity, and attestation, for building the confidential computing threat model.
19
19
20
-

20
+
:::image type="content" source="media/overview-azure-products/three-states.png" alt-text="Graphic of three states of data protection, with confidential computing's data in use highlighted.":::
21
21
22
22
When used with data encryption at rest and in transit, confidential computing eliminates the single largest barrier of encryption - encryption while in use - by protecting sensitive or highly regulated data sets and application workloads in a secure public cloud platform. Confidential computing extends beyond generic data protection. TEEs are also being used to protect proprietary business logic, analytics functions, machine learning algorithms, or entire applications.
23
23
24
24
## Navigating Azure confidential computing
25
25
26
26
[Microsoft's offerings](https://aka.ms/azurecc) for confidential computing extend from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) and as well as developer tools to support your journey to data and code confidentiality in the cloud.
27
27
28
-

28
+
:::image type="content" source="media/overview-azure-products/acc-stack.png" alt-text="Screenshot of the Azure confidential computing stack, showing tools and services.":::
29
29
30
30
## Reducing the attack surface
31
31
The trusted computing base (TCB) refers to all of a system's hardware, firmware, and software components that provide a secure environment. The components inside the TCB are considered "critical". If one component inside the TCB is compromised, the entire system's security may be jeopardized. A lower TCB means higher security. There's less risk of exposure to various vulnerabilities, malware, attacks, and malicious people. Azure confidential computing aims to lower the TCB for your cloud workloads by offering TEEs.
Copy file name to clipboardExpand all lines: articles/confidential-computing/use-cases-scenarios.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,14 @@ author: JBCook
6
6
ms.service: virtual-machines
7
7
ms.subservice: confidential-computing
8
8
ms.topic: overview
9
-
ms.date: 11/01/2021
9
+
ms.date: 11/03/2021
10
10
ms.author: jencook
11
11
ms.custom: ignite-fall-2021
12
12
---
13
13
# Use cases and scenarios
14
14
Confidential computing applies to various use cases for protecting data in regulated industries such as government, financial services, and healthcare institutes. For example, preventing access to sensitive data helps protect the digital identity of citizens from all parties involved, including the cloud provider that stores it. The same sensitive data may contain biometric data that is used for finding and removing known images of child exploitation, preventing human trafficking, and aiding digital forensics investigations.
15
15
16
-

16
+
:::image type="content" source="media/use-cases-scenarios/use_cases.png" alt-text="Screenshot of use cases for Azure confidential computing, including government, financial services, and health care scenarios.":::
17
17
18
18
This article provides an overview of several common scenarios for Azure confidential computing. The recommendations in this article serve as a starting point as you develop your application using confidential computing services and frameworks.
19
19
@@ -51,7 +51,7 @@ In this secure multi-party computation example, multiple banks share data with e
51
51
52
52
Through confidential computing, these financial institutions can increase fraud detection rates, address money laundering scenarios, reduce false positives, and continue learning from larger data sets.
53
53
54
-

54
+
:::image type="content" source="media/use-cases-scenarios/mpc_banks.png" alt-text="Graphic of multiparty data sharing for banks, showing the data movement that confidential computing enables.":::
0 commit comments