enarx
play

Enarx Protection for data in use Mike Bursell Office of the CTO - PowerPoint PPT Presentation

Enarx Protection for data in use Mike Bursell Office of the CTO https://enarx.io Nathaniel McCallum Sr. Principal Engineer Trusted Execution Environments Trusted Execution Environments Host TEE TEE is a protected area within the host,


  1. Enarx Protection for data in use Mike Bursell Office of the CTO https://enarx.io Nathaniel McCallum Sr. Principal Engineer

  2. Trusted Execution Environments

  3. Trusted Execution Environments Host TEE TEE is a protected area within the host, for execution of sensitive workloads

  4. Trusted Execution Environments Host TEE TEE is a protected area within the TEE provides: host, for execution of sensitive Memory Confidentiality ● workloads Integrity Protection ● General compute ● HWRNG ●

  5. Trusted Execution Environments Host Tenant TEE Q. “But how do I know that it’s a TEE provides: valid TEE?” Memory Confidentiality ● Integrity Protection ● General compute ● HWRNG ●

  6. Trusted Execution Summary Attestation Host Tenant TEE Q. “But how do I know that it’s a TEE provides: valid TEE?” Memory Confidentiality ● A. Attestation Integrity Protection ● General compute ● HWRNG ●

  7. Trusted Execution Summary Attestation Host Tenant TEE Attestation includes: TEE provides: Diffie-Hellman Public Key Memory Confidentiality ● ● Hardware Root of Trust Integrity Protection ● ● TEE Measurement General compute ● ● HWRNG ●

  8. Trusted Execution Summary Attestation Host Tenant TEE Code + Data (Encrypted) Attestation includes: TEE provides: Diffie-Hellman Public Key Memory Confidentiality ● ● Hardware Root of Trust Integrity Protection ● ● TEE Measurement General compute ● ● HWRNG ●

  9. Introducing Enarx

  10. Enarx Principles 1. We don’t trust the host owner 2. We don’t trust the host software 3. We don’t trust the host users 4. We don’t trust the host hardware a. … but we’ll make an exception for CPU + firmware

  11. Enarx Design Principles 1. Minimal Trusted Computing Base 2. Minimum trust relationships 3. Deployment-time portability 4. Network stack outside TCB 5. Security at rest, in transit and in use 6. Auditability 7. Open source 8. Open standards 9. Memory safety 10. No backdoors

  12. Enarx Architecture Application Language Bindings (libc, etc.) WASI W3C standards WebAssembly Process-Based VM-Based SGX SEV Keep Keep Sanctum PEF MKTME

  13. Enarx is a Development Deployment Framework Choose Your Develop Compile to Language / Tools Application WebAssembly Choose Host Instance Configuration

  14. Abstracts HW Abstracts Linux Abstracts Protocol Bare Metal Virtual Machine Container Serverless Abstracts Common OS APIs Just enough legacy support to enable trivial application portability. Homogeneity to enable radical deployment-time portability. No interfaces which accidentally leak data to the host. Bridges process-based and VM-based TEE models. No operating system to manage.

  15. Process flow

  16. Overview (AMD example) “Server” “Client” Attestation Host handshake AMD firmware Tenant Code + data Secure VM delivery Code runs (encrypted) 16

  17. Enarx architectural components Host Client Enarx Application Code + Data client CLI Keep (Encrypted) agent 1, 5 Enarx runtime 6 1, 5 3,7 Orchestrator Client/ Enarx host (e.g. Openshift/k8s, host agent 2, 4 agent Openstack) comms Attestation CPU + firmware 17

  18. Enarx attestation process diagram CLI / Enarx client Enarx host CPU/firmware Enarx Keep Orchestrator agent agent 1. Request workload placement 2. Request Keep 3. Create Keep, load Enarx runtime 4. Measurement of Keep + Enarx runtime 5. OK/not-OK 6. Code + Data (encrypted) 7. Load Code + Data into Keep Client Host

  19. Enarx Status

  20. Current Status 1. SEV: Fully attested demo w/ custom assembly. a. Ketuvim: KVM library with SEV support 2. SGX: Fully attested demo w/ data delivery. 3. PEF: Ongoing discussions with POWER team. 4. WASM/WASI: Demo with some basic WASI functions.

  21. We Need Your Help! Website: https://enarx.io Code: https://github.com/enarx Master plan: https://github.com/enarx/enarx/issues/1 License: Apache 2.0 Language: Rust 21

  22. Questions? https://enarx.io

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend