%3CLINGO-SUB%20id%3D%22lingo-sub-1685143%22%20slang%3D%22en-US%22%3ESecure%20your%20IoT%20Edge%20compute%20today%20with%20enclaves%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1685143%22%20slang%3D%22en-US%22%3E%3CP%3EToday%20we%20are%20excited%20to%20announce%20the%20general%20availability%20of%20Azure%20IoT%20Edge%20security%20with%20enclaves%20to%20help%20protect%20sensitive%20assets%20and%20workloads%20at%20runtime%20when%20deployed%20to%20an%20IoT%20Edge%20enclave%20enabled%20device.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20major%20roadblock%20to%20edge%20computing%20and%20Internet%20of%20Things%20(IoT)%20experiences%20is%20the%20risk%20of%20exposing%20sensitive%20assets%20and%20workloads%20to%20exfiltration%20or%20malicious%20tampering.%26nbsp%3B%20Sensitive%20assets%20include%20proprietary%20algorithms%2C%20private%20data%2C%20artificial%20intelligence%20models%2C%20and%20real-time%20computational%20insights%2C%20while%20sensitive%20workloads%20entail%20edge%20computing%20on%20sensitive%20assets%20which%20in%20some%20cases%20create%20valuable%20insights%20that%20generate%20actions%20to%20directly%20control%20critical%20infrastructure.%26nbsp%3B%20While%20these%20assets%20and%20workloads%20can%20be%20secured%20in%20transit%20and%20storage%20using%20encryption%2C%20they%20become%20vulnerable%20at%20runtime%20when%20they%20are%20decrypted%20for%20execution.%26nbsp%3B%20The%20lack%20of%20solutions%20protecting%20the%20confidentiality%20of%20sensitive%20assets%20and%20workloads%20has%20held%20back%20IoT%20solution%20operators%20from%20distributing%20rich%20cloud%20computing%20experiences%20to%20the%20edge%2C%20until%20now.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20align%3D%22center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22trusted-applications-encrypted_red.png%22%20style%3D%22width%3A%20807px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F219660i4E398742EC6117A2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22trusted-applications-encrypted_red.png%22%20alt%3D%22Figure%201%3A%20Deploying%20trusted%20applications%20(TA)%20with%20IoT%20Edge.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%201%3A%20Deploying%20trusted%20applications%20(TA)%20with%20IoT%20Edge.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20solution%20builds%20on%20the%20robust%20edge%20compute%20application%20deployment%20mechanism%20of%20Azure%20IoT%20Edge%20to%20encrypted%20workloads%20(and%20data)%20known%20as%20trusted%20applications%20or%20simply%20TA%2C%20to%20Azure%20IoT%20Edge%20enclave%20enabled%20devices%20for%20safe%20and%20secured%20execution%20inside%20of%20enclaves.%26nbsp%3B%20The%20TA%20is%20encrypted%20from%20when%20it%20leaves%20the%20developer%20build%20machine%20to%20when%20it%20lands%20inside%20of%20the%20devices%20trusted%20execution%20environment%20(TEE)%20or%20enclave%20where%20it%20is%20decrypted%20for%20safe%20execution.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20previously%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fblog%2Fsimplifying-confidential-computing-azure-iot-edge-security-with-enclaves-public-preview%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eannounced%20a%20public%20preview%20of%26nbsp%3B%20this%20solution%20in%20a%20blog%20post%3C%2FA%3E%20where%20we%20detailed%20the%20types%20of%20blocking%20challenges%20and%20showed%20how%20a%20true%20solution%20requires%20deep%20integrations%20and%20collaboration%20with%20ecosystem%20partners.%26nbsp%3B%20These%20integrations%20and%20collaboration%20are%20necessary%20to%20abstract%20the%20complexities%20away%20from%20IoT%20solution%20builders%20so%20they%20can%20focus%20on%20respective%20business%20transformations.%26nbsp%3B%20We%20highlighted%20one%20example%20of%20the%20requisite%20collaboration%20of%20ecosystem%20partners%20to%20simplify%20this%20experience.%26nbsp%3B%20We%20have%20since%20maintained%20focus%20and%20now%20observing%20dividends%20such%20as%20from%20this%20example%20alone%2C%20a%20solution%20builder%20is%20now%20able%20to%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EProcure%20an%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fservices%2Fiot-edge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IoT%20Edge%3C%2FA%3E%20certified%20and%20enclave%20enabled%20device%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fscalys-trustbox-edge%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EScalys%20TrustBox%20Edge%3C%2FA%3E%20that%20features%20collaborative%20integration%20of%20Arm%C2%AE%20TrustZone%C2%AE%2C%20%26nbsp%3BNXP%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fnxp-layerscape-family%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELayerscape%C2%AE%3C%2FA%3E%2C%20and%20%3CA%20href%3D%22http%3A%2F%2Fwww.confidentialcomputing.io%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfidential%20Computing%20Consortium%3C%2FA%3E%20(CCC)%20governed%20%3CA%20href%3D%22https%3A%2F%2Fopenenclave.io%2Fsdk%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOpen%20Enclave%20SDK%3C%2FA%3E%20OSS%20secure%20technologies%20for%20the%20trusted%20execution%20environment.%3C%2FLI%3E%0A%3CLI%3EProcure%20the%20device%20as%20a%20commercial%20off-the-shelf%20product%20from%20global%20distributors%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Farrow-trustbox-edge%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EArrow%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EOptionally%20download%20and%20install%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fiotedge-enclaves-vscode-extension%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOpen%20Enclave%20extension%20for%20Visual%20Studio%20Code%3C%2FA%3E%20to%20help%20facilitate%20development%2C%20debugging%2C%20and%20deployment%20of%20trusted%20applications.%3C%2FLI%3E%0A%3CLI%3EOptionally%20setup%20service%20level%20contracts%20with%20Scalys%20for%20device%20management%20and%20updates.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20general%2C%20the%20ability%20to%20deploy%20TA%20is%20available%20now%20on%20IoT%20Edge%20certified%20enclave%20enabled%20devices%20built%20on%20Arm%20TrustZone%C2%AE%20and%20Intel%C2%AE%20Software%20Extension%20Guard%20(SGX%C2%AE)%20technologies.%20%26nbsp%3B%26nbsp%3BBuilding%20on%20Open%20Enclave%20SDK%20means%20you%20only%20develop%20once%20and%20deploy%20to%20both%20Arm%20and%20Intel%20platforms.%26nbsp%3B%20Moreover%2C%20Open%20Enclave%20SDK%20automatically%20opens%20possibilities%20for%20rich%20cloud-edge%20confidential%20computing%20patterns%20such%20as%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAsymmetrical%20compute%20workload%20distribution%20e.g.%20train%20ML%20models%20in%20the%20cloud%20rich%20environment%20and%20only%20inference%20in%20resource%20constrained%20edge%20devices.%3C%2FLI%3E%0A%3CLI%3ECloud-to-edge%20end-to-end%20confidential%20computing%20with%20workloads%20encrypted%20everywhere%20except%20for%20TEE%20at%20the%20edge%20or%20in%20the%20cloud%20e.g.%20%26nbsp%3Bdeploy%20the%20same%20workload%20in%20Azure%20IoT%20Edge%20enclave%20at%20the%20edge%20or%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fsolutions%2Fconfidential-compute%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Confidential%20Computing%3C%2FA%3E%20virtual%20machines%20in%20the%20cloud.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20commitment%20to%20simplifying%20confidential%20computing%20in%20collaboration%20with%20a%20wide%20ecosystem%20of%20partners%20is%20yielding%20greater%20maturity%20to%20Open%20Enclave%20SDK%2C%20developer%20tooling%2C%20and%20availability%20of%20commercial%20off-the-shelf%20IoT%20Edge%20enclave%20enabled%20devices.%26nbsp%3B%20We%20now%20offer%20secure%20deployments%20of%20trusted%20applications%20from%20cloud%20to%20edge%20at%20scale%20because%20of%20these%20accomplishments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhat%E2%80%99s%20Next%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESimplifying%20confidential%20computing%20is%20a%20massive%20undertaking%20anywhere%20and%20more%20so%20at%20the%20edge%20where%20collaboration%20between%20many%20ecosystem%20roles%20and%20stakeholders%20must%20thrive%20to%20succeed.%26nbsp%3B%20Delivering%20an%20end-to-end%20deployment%20experiences%20is%20a%20major%20success%20milestone%20but%20there%E2%80%99s%20always%20opportunity%20for%20continuous%20improvements%2C%20such%20as%20in%20attestations%20in%20which%20you%20can%20check%20out%20our%20progress%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fattestation%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Azure%20Attestation%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20now%20invite%20you%20to%20unleash%20your%20rich%20edge%20compute%20experiences%20with%20greater%20confidence%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWatch%20a%20%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FOQEpmIXzDTs%3Ft%3D3774%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edemonstration%20of%20confidential%20ML%20inferencing%3C%2FA%3E%20using%20Azure%20IoT%20Edge%20enclaves%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fiot-edge%2Fdeploy-trusted-applications%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edeploying%20trusted%20applications%20with%20Azure%20IoT%20Edge%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fservices%2Fiot-edge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IoT%20Edge%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fopenenclave.io%2Fsdk%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOpen%20Enclave%20SDK%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fconfidential-computing%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Econfidential%20computing%20on%20Azure%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fattestation%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Azure%20Attestation%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EBecome%20an%20active%20participant%20in%20the%20%3CA%20href%3D%22http%3A%2F%2Fwww.confidentialcomputing.io%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfidential%20Computing%20Consortium%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1685143%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22digital_matrix_370x200.png%22%20style%3D%22width%3A%20357px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F219762i62DCDC73D641CF70%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22digital_matrix_370x200.png%22%20alt%3D%22digital_matrix_370x200.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EEncrypt%20IoT%20workloads%20to%20protect%20proprietary%20algorithms%2C%20ML%2C%20and%20privacy%20in%20transit%2C%20storage%2C%20and%20during%20execution.%20Deploy%20at%20scale%20using%20IoT%20Edge%20devices%20enabled%20with%20trusted%20execution%20environment%20(TEE)%20or%20simply%20enclaves.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1685143%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20IoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20IoT%20edge%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Today we are excited to announce the general availability of Azure IoT Edge security with enclaves to help protect sensitive assets and workloads at runtime when deployed to an IoT Edge enclave enabled device. 

 

A major roadblock to edge computing and Internet of Things (IoT) experiences is the risk of exposing sensitive assets and workloads to exfiltration or malicious tampering.  Sensitive assets include proprietary algorithms, private data, artificial intelligence models, and real-time computational insights, while sensitive workloads entail edge computing on sensitive assets which in some cases create valuable insights that generate actions to directly control critical infrastructure.  While these assets and workloads can be secured in transit and storage using encryption, they become vulnerable at runtime when they are decrypted for execution.  The lack of solutions protecting the confidentiality of sensitive assets and workloads has held back IoT solution operators from distributing rich cloud computing experiences to the edge, until now.

 

Figure 1: Deploying trusted applications (TA) with IoT Edge.Figure 1: Deploying trusted applications (TA) with IoT Edge.

 

The solution builds on the robust edge compute application deployment mechanism of Azure IoT Edge to encrypted workloads (and data) known as trusted applications or simply TA, to Azure IoT Edge enclave enabled devices for safe and secured execution inside of enclaves.  The TA is encrypted from when it leaves the developer build machine to when it lands inside of the devices trusted execution environment (TEE) or enclave where it is decrypted for safe execution.

 

We previously announced a public preview of  this solution in a blog post where we detailed the types of blocking challenges and showed how a true solution requires deep integrations and collaboration with ecosystem partners.  These integrations and collaboration are necessary to abstract the complexities away from IoT solution builders so they can focus on respective business transformations.  We highlighted one example of the requisite collaboration of ecosystem partners to simplify this experience.  We have since maintained focus and now observing dividends such as from this example alone, a solution builder is now able to:

 

In general, the ability to deploy TA is available now on IoT Edge certified enclave enabled devices built on Arm TrustZone® and Intel® Software Extension Guard (SGX®) technologies.   Building on Open Enclave SDK means you only develop once and deploy to both Arm and Intel platforms.  Moreover, Open Enclave SDK automatically opens possibilities for rich cloud-edge confidential computing patterns such as:

  • Asymmetrical compute workload distribution e.g. train ML models in the cloud rich environment and only inference in resource constrained edge devices.
  • Cloud-to-edge end-to-end confidential computing with workloads encrypted everywhere except for TEE at the edge or in the cloud e.g.  deploy the same workload in Azure IoT Edge enclave at the edge or Azure Confidential Computing virtual machines in the cloud.

 

Our commitment to simplifying confidential computing in collaboration with a wide ecosystem of partners is yielding greater maturity to Open Enclave SDK, developer tooling, and availability of commercial off-the-shelf IoT Edge enclave enabled devices.  We now offer secure deployments of trusted applications from cloud to edge at scale because of these accomplishments.

 

What’s Next

Simplifying confidential computing is a massive undertaking anywhere and more so at the edge where collaboration between many ecosystem roles and stakeholders must thrive to succeed.  Delivering an end-to-end deployment experiences is a major success milestone but there’s always opportunity for continuous improvements, such as in attestations in which you can check out our progress with Microsoft Azure Attestation

 

We now invite you to unleash your rich edge compute experiences with greater confidence: