You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/operations/platforms/snp.rst
+98-4Lines changed: 98 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ How to use the AMD SEV-SNP platform
6
6
7
7
CCF must run on an AMD CPU which supports SEV-SNP, such as `Azure confidential containers <https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers>`_ or `Azure Kubernetes Service with Confidential Containers <https://learn.microsoft.com/en-us/azure/aks/confidential-containers-overview>`_.
8
8
9
-
To use SNP, in the :ref:`operations/configuration:``enclave``` configuration section, the enclave ``platform`` should be set to ``SNP``.
9
+
CCF will use the SEV-SNP platform features automatically on the supported hardware.
10
10
11
11
Attestation
12
12
-----------
@@ -45,7 +45,6 @@ AMD VCEK endorsements must be fetched, preferably from the THIM service, but con
45
45
46
46
.. tip:: See :ccf_repo:`samples/config/start_config_aks_sev_snp.json` for a sample node configuration for Confidential AKS deployments.
47
47
48
-
49
48
Non-Azure Deployment
50
49
~~~~~~~~~~~~~~~~~~~~
51
50
@@ -74,17 +73,112 @@ Governance Proposals
74
73
75
74
The following governance proposals can be issued to add/remove these trusted values, e.g. when upgrading the service (see :doc:`/operations/code_upgrade`):
76
75
77
-
- ``add_snp_host_data``/``remove_snp_host_data``: To add/remove a trusted security policy, e.g. when adding a new trusted container image as part of the code upgrade procedure.
78
-
- ``add_snp_uvm_endorsement``/``add_snp_uvm_endorsement``: To addremove a trusted UVM endorsement (Azure deployment only).
76
+
- ``add_snp_host_data``/``remove_snp_host_data``: To add/remove a trusted security policy, e.g. when adding a new trusted container image as part of the code upgrade procedure.
77
+
- ``add_snp_uvm_endorsement``/``remove_snp_uvm_endorsement``: To add/remove a trusted UVM endorsement (Azure deployment only).
79
78
- ``add_snp_measurement``/``remove_snp_measurement``: To add/remove a trusted measurement.
80
79
- ``set_snp_minimum_tcb_version_hex``/``remove_snp_minimum_tcb_version``: To add/remove a minimum trusted TCB version.
81
80
- ``set_snp_minimum_tcb_version`` was deprecated in CCF 6.0.9 and replaced by ``set_snp_minimum_tcb_version_hex``.
82
81
82
+
Code update
83
+
~~~~~~~~~~~
84
+
85
+
Check :doc:`/operations/code_upgrade` first.
86
+
87
+
* Use ``add_snp_host_data`` and ``add_snp_measurement`` for the new code version.
88
+
* After adding new nodes and retiring old ones, use ``remove_snp_host_data`` and ``remove_snp_measurement`` to remove the old values.
89
+
90
+
Examples:
91
+
92
+
.. code-block:: json
93
+
94
+
{
95
+
"actions": [
96
+
{
97
+
"name": "add_snp_host_data",
98
+
"args": {
99
+
"host_data": "hex-encoded SHA256 digest of the security policy",
To update the UVM endorsements, for instance, to rev up the SVN version, use ``add_snp_uvm_endorsement`` and ``remove_snp_uvm_endorsement`` governance actions.
143
+
144
+
* If performing a platform upgrade, new UVM endorsements should be added to the current network before joining new nodes.
145
+
* Every endorsement is uniquely identified by (DID, feed) pair.
The `set_snp_minimum_tcb_version_hex` governance action was introduced in CCF 6.0.9 to simplify the process of setting the minimum TCB version for a specific CPU model. This action allows you to specify the CPUID and the TCB version as hex-strings, which are then parsed and stored in the :ref:`audit/builtin_maps:``nodes.snp.tcb_versions``` table.
87
180
To set the minimum TCB version for a specific CPU model, you can use the following governance action:
Copy file name to clipboardExpand all lines: doc/operations/platforms/virtual.rst
+2-7Lines changed: 2 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,6 @@ Insecure Virtual
6
6
How to use the Insecure Virtual Platform
7
7
----------------------------------------
8
8
9
-
The insecure virtual platform can run on any hardware supported by CCF.
9
+
The insecure virtual platform is a default fallback option if SEV-SNP is not supported on the machine of choice.
10
10
11
-
To use virtual, in the :ref:`operations/configuration:``enclave``` configuration section, the enclave ``platform`` should be set to ``Virtual``, and ``type`` to ``Virtual``.
12
-
13
-
Attestation
14
-
-----------
15
-
16
-
As no attestation is provided by virtual nodes, any CCF node (e.g. a malicious node that would leak the service secret key) is allowed to join an existing CCF service.
11
+
There's a "virtual" (fake) attestation provided by nodes, which exists to unify some of the code paths, but has no real security properties.
0 commit comments