What is Confidential Computing?

Individuals and enterprises all around the globe are widely using cloud computing. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control over data placement and data portability across cloud providers. While some challenges have promising solutions, they remain unfulfilled. Despite strict administrative controls by cloud providers, there are still ways to access the processed data. Cloud provider end-user agreements explicitly inform that data can be processed in third-party countries. Finally, the frustrating grip of cloud provider lock-in is evident to anyone who tried to export and migrate all their data from a cloud service.

New hardware security features and ongoing industry standardization created a novel cloud security paradigm called confidential computing. It allows creating isolated, verifiable, secure, user-controlled Trusted Execution Environments (TEE). This approach drastically reduces the trust that customers needs to place in cloud providers. Best of all, it opens new capabilities for business exchanges. To speed up the adoption of better security in cloud computing, several industry actors have started the Confidential Computing Consortium under the Linux Foundation.

How does a Trusted Execution Environment work?

A Trusted Execution Environment (TEE) allows guaranteeing protection, confidentiality and integrity of data. At any time, users can obtain a verifiable statement (called attestation) about the security properties of the TEE. Service providers can in turn use attestations to prove to users and third parties the security of the service running in the TEE.

Users and service providers can create TEEs using hardware security features widely available across server platforms, desktops and mobile devices (such as Intel SGX, AMD SEV, IBM PEF, ARM TrustZone).

Use-cases

At CanaryBit, we see plenty of cases where confidential computing can make a difference. Confidential computing is not only about “more security”. Confidential computing allows to reduce costs, simplify audit and compliance reporting, and offer an alternative in the trade-off between privacy and convenience.

Benefits of Confidential Computing

Consider some benefits, such as:

1. Lower cost to enforce, demonstrate and audit data security compliance. CISOs can automate security compliance to a very large degree using tools leveraging confidential computing.
It allows reducing the time (and cost) to verify the security of the computing infrastructure.

2. Secure enclaves allow businesses to combine and process data from several sources, potentially even without getting access to the raw data.
This is much more efficient compared to other, cryptographic solutions (such as multiparty computation).

3. Lower cost to process data in a secure computing environment. Instead of dedicating costly efforts to set up and operate a secure data processing environment, organizations can process security-sensitive data in enclaves on public clouds.

End-users can set up TEEs and run cloud services inside such protected environments. They can keep full control over data, both at rest and while being processed.
Some examples of services include cryptocurrency wallets, password managers, personal digital health record archives and finance management tools.

Get Started!

Explore how Confidential Cloud helps to secure your cloud infrastructure, protect your data from any AI workload and in turn, enable new business.

 

YOU MAY ALSO LIKE …

Strengthening relationships at NCC-IT and Cybertech Europe 2024

Strengthening relationships at NCC-IT and Cybertech Europe 2024

On October 8, we are excited to be in Turin (Italy) at the Italian National Cybersecurity Agency’s (ACN) NCC-IT event to present CanaryBit, establish new contacts, synergies and partnerships, while interconnecting and exchanging experiences at European level. The next...

The Golden Age of Data Owners

The Golden Age of Data Owners

The Promise of AI Throughout the past months, generative AI has taken by storm the minds of decision makers and practitioners alike. It is finding its way into corporate strategy documents. The AI cornucopia is churning out hundreds upon hundreds of start-ups that...