The Enclave Device Blueprint for confidential computing at the edge

%3CLINGO-SUB%20id%3D%22lingo-sub-2931236%22%20slang%3D%22en-US%22%3EThe%20Enclave%20Device%20Blueprint%20for%20confidential%20computing%20at%20the%20edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2931236%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EWritten%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Eustace%20Asanghanwa's%20blog%20archive%22%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fauthor%2Feustacea%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEustace%20Asanghanwa%3C%2FA%3E%2C%20Principal%20Program%20Manager%2C%20Azure%20IoT%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EA%20major%20milestone%20towards%20making%20confidential%20computing%20in%20IoT%20mainstream%20for%20privacy%20and%20safety.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EIn%20collaboration%20with%20Arm%C2%AE%20Technologies%20and%20Scalys%20BV%2C%20we%20are%20announcing%20the%20immediate%20availability%20of%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22The%20Enclave%20Device%20Blueprint%20for%20Confidential%20Computing%20at%20the%20Edge%20white%20paper%20download%22%20href%3D%22https%3A%2F%2Faka.ms%2Fedb-whitepaper%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnclave%20Device%20Blueprint%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20help%20towards%20making%20confidential%20computing%20a%20mainstream%20computing%20paradigm%20at%20the%20edge.%20The%20exponential%20growth%20in%20intelligent%20processing%20at%20the%20edge%20and%20autonomous%20command%20and%20control%20in%20the%20internet%20of%20things%20(IoT)%20necessitates%20confidential%20computing%20to%20protect%20privacy%20and%20safety.%20Confidential%20computing%20at%20the%20edge%20demands%20the%20use%20of%20security-hardened%20and%20tamper-resistant%20computing%20isolations%20called%20Trusted%20Execution%20Environments%20(TEE)%20or%20simply%20enclaves.%20Enclave%20devices%20are%20extremely%20complex%20to%20engineer%20and%20operate%2C%20and%20their%20absence%20is%20holding%20back%20the%20fullest%20potential%20in%20edge%20computing.%20The%20Enclave%20Device%20Blueprint%20is%20here%20to%20help%20simplify%20the%20engineering%20of%20enclave%20devices%20and%20deploying%20confidential%20applications%20in%20IoT.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Enclave%20Device%20Blueprint%20Architecture.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F324567i5CFE82AEDD385D9C%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Enclave%20Device%20Blueprint%20Architecture.png%22%20alt%3D%22Figure%201%3A%20Enclave%20Device%20Blueprint%20Architecture%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%201%3A%20Enclave%20Device%20Blueprint%20Architecture%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CA%20title%3D%22The%20Enclave%20Device%20Blueprint%20for%20confidential%20computing%20at%20the%20edge%22%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fthe-enclave-device-blueprint-for-confidential-computing-at-the-edge%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3ERead%20the%20full%20article%20to%20learn%20more%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Regular Contributor

Written by Eustace Asanghanwa, Principal Program Manager, Azure IoT

 

A major milestone towards making confidential computing in IoT mainstream for privacy and safety.

 

In collaboration with Arm® Technologies and Scalys BV, we are announcing the immediate availability of the Enclave Device Blueprint to help towards making confidential computing a mainstream computing paradigm at the edge. The exponential growth in intelligent processing at the edge and autonomous command and control in the internet of things (IoT) necessitates confidential computing to protect privacy and safety. Confidential computing at the edge demands the use of security-hardened and tamper-resistant computing isolations called Trusted Execution Environments (TEE) or simply enclaves. Enclave devices are extremely complex to engineer and operate, and their absence is holding back the fullest potential in edge computing. The Enclave Device Blueprint is here to help simplify the engineering of enclave devices and deploying confidential applications in IoT.

 

Figure 1: Enclave Device Blueprint ArchitectureFigure 1: Enclave Device Blueprint Architecture

 

Read the full article to learn more

0 Replies