Navigating confidential computing across Azure

Published Jul 07 2021 07:58 AM 1,159 Views
Microsoft

What is confidential computing?

Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment (TEE). While cloud native workloads data is typically protected when in transit through networking encryption (i.e. TLS, VPN), and at rest (i.e. encrypted storage), confidential computing enables data protection in memory while processing. The confidential computing threat model aims at removing or reducing the ability for a cloud provider operator and other actors in the tenant’s domain to access code and data while being executed.

 

Technologies like Intel Software Guard Extensions (SGX), or AMD Secure Encrypted Virtualization (SEV-SNP) are recent CPU improvements supporting confidential computing implementations. These technologies are designed as virtualization extensions and provide feature sets including memory encryption and integrity, CPU-state confidentiality and integrity, and attestation, for building the confidential computing threat model.

Figure 1 - Three States of Data.png

Figure 1 – The three states of data protection.

 

When used in conjunction with data encryption at rest and in transit, confidential computing eliminates the single largest barrier of encryption - encryption in use - by moving sensitive or highly regulated data sets and application workloads from an inflexible, expensive on-premises IT infrastructure to a more flexible and modern public cloud platform. Confidential computing extends beyond just generic data protection. TEEs are also being used to protect proprietary business logic, analytics functions, machine learning algorithms, or entire applications.

 

Logo Signal.png

Customers like Signal, for example, adopt Azure confidential computing to provide a scalable and secure environment for its messenger app. Signal’s private contact discovery service efficiently and scalably determines whether the contacts in their address book are Signal users without revealing the contacts in their address book even to the Signal service, making contact data inaccessible to any unauthorized party, including staff at Signal or Microsoft as cloud provider.

 

"We utilize Azure confidential computing to provide scalable, secure environments for our services. Signal puts users first, and Azure helps us stay at the forefront of data protection with confidential computing.” Jim O'Leary, VP of Engineering, Signal

 

Logo RBC.png

Royal Bank of Canada (RBC) is currently piloting a confidential multiparty data analytics and machine learning pipeline on top of the Azure confidential computing platform, which ensures that participating institutions can be confident that their confidential customer and proprietary data is not visible to other participating institutions, including RBC itself.

 

“Now with Azure confidential computing, we can protect data not only at rest and in transit, but also while it is in use, which completes the life cycle around data privacy.” Bob Blainey, RBC Fellow, Royal Bank of Canada

 

Confidential computing use cases

We have observed a variety of use cases for protecting data in regulated industries such as Government, Financial services, and Healthcare institutes. For example, preventing access to PII (Personally Identifiable Information) data helps protect the digital identity of citizens when accessing public services from all parties involved in the data access, including the cloud provider that stores it. The same personally identifiable information may contain biometric data that can be used for finding and removing known images of child exploitation and prevent human trafficking, as well as in digital forensics investigations.

 

Business transactions and project collaboration require the sharing of information among multiple parties. Often, data being shared is confidential, whether it’s PII, financial records, medical records, private citizen data, etc. Public and private organizations require data protection from unauthorized access, including the people who regularly deal with that data. This includes computing infrastructure admins or engineers, security architects, business consultants, and data scientists.

 

The use of machine learning for healthcare services has grown massively with the broader access to large datasets and imagery of patients captured by medical devices. Disease diagnostic and drug development benefit from  access to datasets from multiple data sources. Hospitals and health institutes can collaborate by sharing their patient medical records with a centralized trusted execution environment (TEE). Machine learning services running in the TEE aggregate and analyze data and can provide a higher accuracy of prediction by training their models on consolidated datasets, with no risks of compromising the privacy of their patients.

Figure 2 - ACC Use Cases.png

Figure 2 – Some of potential business use cases that confidential computing help address.

 

Navigating Azure confidential computing offerings

Microsoft's offerings for confidential computing extend from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) and as well as developer tools to support your journey to data and code confidentiality in the cloud.

Figure 3 - ACC Technology Stack.png

Figure 3 – The Azure Confidential Computing technology stack.

 

Azure offers different virtual machines for confidential computing IaaS workloads and customers can choose what’s best for them depending on their desired security posture. Figure 4 shows the “trust ladder” of what customers can expect from a security posture perspective on these IaaS offerings.

Figure 4 - ACC Trust Ladder.png

Figure 4 – The “trust ladder” of Azure confidential computing IaaS.

 

Our services currently generally available to the public include:

  • Intel SGX-enabled Virtual Machines. Azure offers the DCsv2 series built on Intel SGX technology for hardware-based enclave creation. You can build secure enclave-based applications to run in the DCsv2-series of VMs to protect your application data and code in use.
  • Enclave aware containers running on Azure Kubernetes Service (AKS). Confidential computing nodes on AKS use Intel SGX to create isolated enclave environments in the nodes between each container application.
  • Microsoft Azure Attestation, a remote attestation service for validating the trustworthiness of multiple Trusted Execution Environments (TEEs) and verifying integrity of the binaries running inside the TEEs.
  • Azure Key Vault Managed HSM, a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated Hardware Security Modules (HSM).
  • Azure IoT Edge supports confidential applications that run within secure enclaves on an Internet of Things (IoT) device. IoT devices are often exposed to tampering and forgery because they are physically accessible by bad actors. Confidential IoT Edge devices add trust and integrity at the edge by protecting the access to telemetry data captured by and stored inside the device itself before streaming it to the cloud.

 

Additional services are currently in public preview, including our recent announcements at Microsoft Build 2021:

  • Confidential Virtual Machines based on AMD SEV-SNP technology are currently in limited preview and available to selected customers. To sign up for access to the limited preview of Azure Confidential VMs, please fill in this form.
  • Trusted Launch is a Generation 2 VM that is hardened with security features – secure boot, virtual trusted platform module, and boot integrity monitoring – that protects against boot kits, rootkits, and kernel-level malware.
  • Always Encrypted with secure enclaves in Azure SQL. The confidentiality of sensitive data is protected from malware and high-privileged unauthorized users by running SQL queries directly inside a TEE when the SQL statement contains any operations on encrypted data that require the use of the secure enclave where the database engine runs.
  • Azure Confidential Ledger. ACL is a tamper-proof register for storing sensitive data for record keeping and auditing or for data transparency in multi-party scenarios. It offers Write-Once-Read-Many guarantees which make data non-erasable and non-modifiable. The service is built on Microsoft Research’s Confidential Consortium Framework.
  • Confidential Inference ONNX Runtime, a Machine Learning (ML) inference server that restricts the ML hosting party from accessing both the inferencing request and its corresponding response.

 

We have seen different workloads having different requirements based on their ability to modify their code, or when they would instead prefer to “lift and shift” to be confidential. Figure 5 can be useful to help navigate the Confidential IaaS, Containers, Enclaves and the PaaS offerings in Azure.

Figure 5 - ACC Easy to Control.png

Figure 5 – Navigating the Azure confidential computing offerings.

 

Conclusion

Our vision with confidential computing is to transform the Azure Cloud to the Azure Confidential Cloud and move the industry from computing in the clear to computing confidentially in the cloud as well as the edge. Join us as we create this future!

For more information on the current services please visit https://aka.ms/azurecc or visit our docs.

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2520752%22%20slang%3D%22en-US%22%3ENavigating%20confidential%20computing%20across%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2520752%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EWhat%20is%20confidential%20computing%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EConfidential%20computing%20is%20the%20protection%20of%20data%20in%20use%20by%20performing%20computation%20in%20a%20hardware-based%20Trusted%20Execution%20Environment%20(TEE).%20While%20cloud%20native%20workloads%20data%20is%20typically%20protected%20when%20in%20transit%20through%20networking%20encryption%20(i.e.%20TLS%2C%20VPN)%2C%20and%20at%20rest%20(i.e.%20encrypted%20storage)%2C%20confidential%20computing%20enables%20data%20protection%20in%20memory%20while%20processing.%20The%20confidential%20computing%20threat%20model%20aims%20at%20removing%20or%20reducing%20the%20ability%20for%20a%20cloud%20provider%20operator%20and%20other%20actors%20in%20the%20tenant%E2%80%99s%20domain%20to%20access%20code%20and%20data%20while%20being%20executed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETechnologies%20like%20%3CA%20href%3D%22https%3A%2F%2Fwww.intel.com.au%2Fcontent%2Fwww%2Fau%2Fen%2Farchitecture-and-technology%2Fsoftware-guard-extensions-enhanced-data-protection.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EIntel%20Software%20Guard%20Extensions%3C%2FA%3E%20(SGX)%2C%20or%20%3CA%20href%3D%22https%3A%2F%2Fwww.amd.com%2Fen%2Fprocessors%2Famd-secure-encrypted-virtualization%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAMD%20Secure%20Encrypted%20Virtualization%3C%2FA%3E%20(SEV-SNP)%20are%20recent%20CPU%20improvements%20supporting%20confidential%20computing%20implementations.%20These%20technologies%20are%20designed%20as%20virtualization%20extensions%20and%20provide%20feature%20sets%20including%20memory%20encryption%20and%20integrity%2C%20CPU-state%20confidentiality%20and%20integrity%2C%20and%20attestation%2C%20for%20building%20the%20confidential%20computing%20threat%20model.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Figure%201%20-%20Three%20States%20of%20Data.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293830iE02EBD29F7985FCC%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Figure%201%20-%20Three%20States%20of%20Data.png%22%20alt%3D%22Figure%201%20-%20Three%20States%20of%20Data.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%201%20%E2%80%93%20The%20three%20states%20of%20data%20protection.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20used%20in%20conjunction%20with%20data%20encryption%20at%20rest%20and%20in%20transit%2C%20confidential%20computing%20eliminates%20the%20single%20largest%20barrier%20of%20encryption%20-%20encryption%20in%20use%20-%20by%20moving%20sensitive%20or%20highly%20regulated%20data%20sets%20and%20application%20workloads%20from%20an%20inflexible%2C%20expensive%20on-premises%20IT%20infrastructure%20to%20a%20more%20flexible%20and%20modern%20public%20cloud%20platform.%20Confidential%20computing%20extends%20beyond%20just%20generic%20data%20protection.%20TEEs%20are%20also%20being%20used%20to%20protect%20proprietary%20business%20logic%2C%20analytics%20functions%2C%20machine%20learning%20algorithms%2C%20or%20entire%20applications.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22width%3A%20100%25%3B%20border-style%3A%20none%3B%20border-color%3A%20%23FFFFFF%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Logo%20Signal.png%22%20style%3D%22width%3A%20274px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293835i147E7A9F44B35FC9%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Logo%20Signal.png%22%20alt%3D%22Logo%20Signal.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CP%3ECustomers%20like%20%3CA%20href%3D%22https%3A%2F%2Fcustomers.microsoft.com%2Fen-us%2Fstory%2F1374464612401582154-signal-nonprofit-azure-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESignal%3C%2FA%3E%2C%20for%20example%2C%20adopt%20Azure%20confidential%20computing%20to%20provide%20a%20scalable%20and%20secure%20environment%20for%20its%20messenger%20app.%20Signal%E2%80%99s%20private%20contact%20discovery%20service%20efficiently%20and%20scalably%20determines%20whether%20the%20contacts%20in%20their%20address%20book%20are%20Signal%20users%20without%20revealing%20the%20contacts%20in%20their%20address%20book%20even%20to%20the%20Signal%20service%2C%20making%20contact%20data%20inaccessible%20to%20any%20unauthorized%20party%2C%20including%20staff%20at%20Signal%20or%20Microsoft%20as%20cloud%20provider.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%22We%20utilize%20Azure%20confidential%20computing%20to%20provide%20scalable%2C%20secure%20environments%20for%20our%20services.%20Signal%20puts%20users%20first%2C%20and%20Azure%20helps%20us%20stay%20at%20the%20forefront%20of%20data%20protection%20with%20confidential%20computing.%E2%80%9D%20%3CSTRONG%3EJim%20O'Leary%2C%20VP%20of%20Engineering%2C%20Signal%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22border-style%3A%20none%3B%20width%3A%20100%25%3B%20border-color%3A%20%23FFFFFF%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Logo%20RBC.png%22%20style%3D%22width%3A%20260px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293836iCF1ABA24CDA3F13D%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Logo%20RBC.png%22%20alt%3D%22Logo%20RBC.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcustomers.microsoft.com%2Fen-us%2Fstory%2F1356341973555285762-royalbankofcanada-banking-capital-markets-azure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERoyal%20Bank%20of%20Canada%3C%2FA%3E%20(RBC)%20is%20currently%20piloting%20a%20confidential%20multiparty%20data%20analytics%20and%20machine%20learning%20pipeline%20on%20top%20of%20the%20Azure%20confidential%20computing%20platform%2C%20which%20ensures%20that%20participating%20institutions%20can%20be%20confident%20that%20their%20confidential%20customer%20and%20proprietary%20data%20is%20not%20visible%20to%20other%20participating%20institutions%2C%20including%20RBC%20itself.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%E2%80%9CNow%20with%20Azure%20confidential%20computing%2C%20we%20can%20protect%20data%20not%20only%20at%20rest%20and%20in%20transit%2C%20but%20also%20while%20it%20is%20in%20use%2C%20which%20completes%20the%20life%20cycle%20around%20data%20privacy.%E2%80%9D%20%3CSTRONG%3EBob%20Blainey%2C%20RBC%20Fellow%2C%20Royal%20Bank%20of%20Canada%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConfidential%20computing%20use%20cases%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20have%20observed%20a%20variety%20of%20use%20cases%20for%20protecting%20data%20in%20regulated%20industries%20such%20as%20Government%2C%20Financial%20services%2C%20and%20Healthcare%20institutes.%20For%20example%2C%20preventing%20access%20to%20PII%20(Personally%20Identifiable%20Information)%20data%20helps%20protect%20the%20digital%20identity%20of%20citizens%20when%20accessing%20public%20services%20from%20all%20parties%20involved%20in%20the%20data%20access%2C%20including%20the%20cloud%20provider%20that%20stores%20it.%20The%20same%20personally%20identifiable%20information%20may%20contain%20biometric%20data%20that%20can%20be%20used%20for%20finding%20and%20removing%20known%20images%20of%20child%20exploitation%20and%20prevent%20human%20trafficking%2C%20as%20well%20as%20in%20digital%20forensics%20investigations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBusiness%20transactions%20and%20project%20collaboration%20require%20the%20sharing%20of%20information%20among%20multiple%20parties.%20Often%2C%20data%20being%20shared%20is%20confidential%2C%20whether%20it%E2%80%99s%20PII%2C%20financial%20records%2C%20medical%20records%2C%20private%20citizen%20data%2C%20etc.%20Public%20and%20private%20organizations%20require%20data%20protection%20from%20unauthorized%20access%2C%20including%20the%20people%20who%20regularly%20deal%20with%20that%20data.%20This%20includes%20computing%20infrastructure%20admins%20or%20engineers%2C%20security%20architects%2C%20business%20consultants%2C%20and%20data%20scientists.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20use%20of%20machine%20learning%20for%20healthcare%20services%20has%20grown%20massively%20with%20the%20broader%20access%20to%20large%20datasets%20and%20imagery%20of%20patients%20captured%20by%20medical%20devices.%20Disease%20diagnostic%20and%20drug%20development%20benefit%20from%20%26nbsp%3Baccess%20to%20datasets%20from%20multiple%20data%20sources.%20Hospitals%20and%20health%20institutes%20can%20collaborate%20by%20sharing%20their%20patient%20medical%20records%20with%20a%20centralized%20trusted%20execution%20environment%20(TEE).%20Machine%20learning%20services%20running%20in%20the%20TEE%20aggregate%20and%20analyze%20data%20and%20can%20provide%20a%20higher%20accuracy%20of%20prediction%20by%20training%20their%20models%20on%20consolidated%20datasets%2C%20with%20no%20risks%20of%20compromising%20the%20privacy%20of%20their%20patients.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Figure%202%20-%20ACC%20Use%20Cases.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293831i053635683E1EB2DC%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Figure%202%20-%20ACC%20Use%20Cases.png%22%20alt%3D%22Figure%202%20-%20ACC%20Use%20Cases.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%202%20%E2%80%93%20Some%20of%20potential%20business%20use%20cases%20that%20confidential%20computing%20help%20address.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENavigating%20Azure%20confidential%20computing%20offerings%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fazurecc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft's%20offerings%3C%2FA%3E%20for%20confidential%20computing%20extend%20from%20Infrastructure%20as%20a%20Service%20(IaaS)%20to%20Platform%20as%20a%20Service%20(PaaS)%20and%20as%20well%20as%20developer%20tools%20to%20support%20your%20journey%20to%20data%20and%20code%20confidentiality%20in%20the%20cloud.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Figure%203%20-%20ACC%20Technology%20Stack.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293832i6E5CC0FF130B5180%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Figure%203%20-%20ACC%20Technology%20Stack.png%22%20alt%3D%22Figure%203%20-%20ACC%20Technology%20Stack.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%203%20%E2%80%93%20The%20Azure%20Confidential%20Computing%20technology%20stack.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20offers%20different%20virtual%20machines%20for%20confidential%20computing%20IaaS%20workloads%20and%20customers%20can%20choose%20what%E2%80%99s%20best%20for%20them%20depending%20on%20their%20desired%20security%20posture.%20Figure%204%20shows%20the%20%E2%80%9Ctrust%20ladder%E2%80%9D%20of%20what%20customers%20can%20expect%20from%20a%20security%20posture%20perspective%20on%20these%20IaaS%20offerings.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Figure%204%20-%20ACC%20Trust%20Ladder.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293833i96494878AEEC8AAC%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Figure%204%20-%20ACC%20Trust%20Ladder.png%22%20alt%3D%22Figure%204%20-%20ACC%20Trust%20Ladder.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%204%20%E2%80%93%20The%20%E2%80%9Ctrust%20ladder%E2%80%9D%20of%20Azure%20confidential%20computing%20IaaS.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20services%20currently%20generally%20available%20to%20the%20public%20include%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fconfidential-computing%2Fconfidential-computing-enclaves%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntel%20SGX-enabled%20Virtual%20Machines%3C%2FA%3E.%20Azure%20offers%20the%20DCsv2%20series%20built%20on%20Intel%20SGX%20technology%20for%20hardware-based%20enclave%20creation.%20You%20can%20build%20secure%20enclave-based%20applications%20to%20run%20in%20the%20DCsv2-series%20of%20VMs%20to%20protect%20your%20application%20data%20and%20code%20in%20use.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fconfidential-computing%2Fenclave-aware-containers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnclave%20aware%20containers%3C%2FA%3E%20running%20on%20Azure%20Kubernetes%20Service%20(AKS).%20Confidential%20computing%20nodes%20on%20AKS%20use%20Intel%20SGX%20to%20create%20isolated%20enclave%20environments%20in%20the%20nodes%20between%20each%20container%20application.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fattestation%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Azure%20Attestation%3C%2FA%3E%2C%20a%20remote%20attestation%20service%20for%20validating%20the%20trustworthiness%20of%20multiple%20Trusted%20Execution%20Environments%20(TEEs)%20and%20verifying%20integrity%20of%20the%20binaries%20running%20inside%20the%20TEEs.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fmanaged-hsm%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Key%20Vault%20Managed%20HSM%3C%2FA%3E%2C%20a%20fully%20managed%2C%20highly%20available%2C%20single-tenant%2C%20standards-compliant%20cloud%20service%20that%20enables%20you%20to%20safeguard%20cryptographic%20keys%20for%20your%20cloud%20applications%2C%20using%20FIPS%20140-2%20Level%203%20validated%20Hardware%20Security%20Modules%20(HSM).%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fiot-edge%2Fdeploy-confidential-applications%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20IoT%20Edge%3C%2FA%3E%20supports%20confidential%20applications%20that%20run%20within%20secure%20enclaves%20on%20an%20Internet%20of%20Things%20(IoT)%20device.%20IoT%20devices%20are%20often%20exposed%20to%20tampering%20and%20forgery%20because%20they%20are%20physically%20accessible%20by%20bad%20actors.%20Confidential%20IoT%20Edge%20devices%20add%20trust%20and%20integrity%20at%20the%20edge%20by%20protecting%20the%20access%20to%20telemetry%20data%20captured%20by%20and%20stored%20inside%20the%20device%20itself%20before%20streaming%20it%20to%20the%20cloud.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdditional%20services%20are%20currently%20in%20public%20preview%2C%20including%20our%20recent%20announcements%20at%20Microsoft%20Build%202021%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EConfidential%20Virtual%20Machines%20based%20on%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fazure-and-amd-enable-lift-and-shift-confidential-computing%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAMD%20SEV-SNP%20technology%3C%2FA%3E%20are%20currently%20in%20limited%20preview%20and%20available%20to%20selected%20customers.%20To%20sign%20up%20for%20access%20to%20the%20limited%20preview%20of%20Azure%20Confidential%20VMs%2C%20please%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fcvmsignup%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Efill%20in%20this%20form%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fannouncing-preview-of-azure-trusted-launch-for-virtual-machines%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETrusted%20Launch%3C%2FA%3E%20is%20a%20Generation%202%20VM%20that%20is%20hardened%20with%20security%20features%20%E2%80%93%20secure%20boot%2C%20virtual%20trusted%20platform%20module%2C%20and%20boot%20integrity%20monitoring%20%E2%80%93%20that%20protects%20against%20boot%20kits%2C%20rootkits%2C%20and%20kernel-level%20malware.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsql%2Frelational-databases%2Fsecurity%2Fencryption%2Falways-encrypted-enclaves%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAlways%20Encrypted%20with%20secure%20enclaves%20in%20Azure%20SQL%3C%2FA%3E.%20The%20confidentiality%20of%20sensitive%20data%20is%20protected%20from%20malware%20and%20high-privileged%20unauthorized%20users%20by%20running%20SQL%20queries%20directly%20inside%20a%20TEE%20when%20the%20SQL%20statement%20contains%20any%20operations%20on%20encrypted%20data%20that%20require%20the%20use%20of%20the%20secure%20enclave%20where%20the%20database%20engine%20runs.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fconfidential-ledger%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Confidential%20Ledger%3C%2FA%3E.%20ACL%20is%20a%20tamper-proof%20register%20for%20storing%20sensitive%20data%20for%20record%20keeping%20and%20auditing%20or%20for%20data%20transparency%20in%20multi-party%20scenarios.%20It%20offers%20Write-Once-Read-Many%20guarantees%20which%20make%20data%20non-erasable%20and%20non-modifiable.%20The%20service%20is%20built%20on%20Microsoft%20Research%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fresearch%2Fproject%2Fconfidential-consortium-framework%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfidential%20Consortium%20Framework%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fonnx-server-openenclave%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfidential%20Inference%20ONNX%20Runtime%3C%2FA%3E%2C%20a%20Machine%20Learning%20(ML)%20inference%20server%20that%20restricts%20the%20ML%20hosting%20party%20from%20accessing%20both%20the%20inferencing%20request%20and%20its%20corresponding%20response.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20seen%20different%20workloads%20having%20different%20requirements%20based%20on%20their%20ability%20to%20modify%20their%20code%2C%20or%20when%20they%20would%20instead%20prefer%20to%20%E2%80%9Clift%20and%20shift%E2%80%9D%20to%20be%20confidential.%20Figure%205%20can%20be%20useful%20to%20help%20navigate%20the%20Confidential%20IaaS%2C%20Containers%2C%20Enclaves%20and%20the%20PaaS%20offerings%20in%20Azure.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Figure%205%20-%20ACC%20Easy%20to%20Control.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293834iC885D9C0D577EEF3%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Figure%205%20-%20ACC%20Easy%20to%20Control.png%22%20alt%3D%22Figure%205%20-%20ACC%20Easy%20to%20Control.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%205%20%E2%80%93%20Navigating%20the%20Azure%20confidential%20computing%20offerings.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConclusion%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOur%20vision%20with%20confidential%20computing%20is%20to%20transform%20the%20Azure%20Cloud%20to%20the%20Azure%20Confidential%20Cloud%20and%20move%20the%20industry%20from%20computing%20in%20the%20clear%20to%20computing%20confidentially%20in%20the%20cloud%20as%20well%20as%20the%20edge.%20Join%20us%20as%20we%20create%20this%20future!%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20on%20the%20current%20services%20please%20visit%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fazurecc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fazurecc%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fconfidential-computing%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Evisit%20our%20docs%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2520752%22%20slang%3D%22en-US%22%3E%3CP%3EConfidential%20computing%20is%20the%20protection%20of%20data%20in%20use%20by%20performing%20computation%20in%20a%20hardware-based%20Trusted%20Execution%20Environment.%20This%20article%20describes%20the%20latest%20offering%20for%20confidential%20computing%20in%20Azure%2C%20typical%20use%20cases%20of%20adoption%20of%20confidential%20computing%2C%20and%20a%20few%20customers%20that%20are%20using%20Azure%20confidential%20computing%20today%20to%20protect%20their%20confidential%20data.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2520752%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EUpdates%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jul 06 2021 01:32 PM
Updated by: