📃
Confidential Computing 101
HomeTechnologyTry CC!
  • Welcome
  • Confidential Computing
    • What is Confidential Computing
    • What problems Confidential Computing solves
      • Bare Metal
      • Docker
      • Kubernetes
      • Knative
    • Why Confidential Computing
    • How Confidential Computing works
      • Memory Encryption
      • Workload Attestation
      • Confidential Boot
      • Sealing / Binding
      • Secret Provisioning
    • Technology Overview
    • Cloud Service Providers
  • Technology in depth
    • Intel SGX
      • Getting Started
        • Bare Metal Server Installation
        • Enclave Development Environment
        • Intel SGX SDK Setup
      • Technology
        • 🎭Features
        • 💂Threat Model
        • 🆚Versions
        • 🟦Concepts
          • 🏦Memory Encryption
          • 👮Local and Remote Attestation
          • 🖼️DCAP-Attestation Framework
          • 🔑Secret Key Provisioning
      • enclaive Development Kit
        • 🏢Architecture
        • 🌪️Workflow
        • 🌍Tutorials
          • Azure DCdsv3, DCsv2, or DCsv3 Setup
          • Redis in cK8s
          • MongoDB in cK8s
          • K8s + HashiCorp Vault on Azure DCsv3
      • Vault Remote Attestation Plug-In
        • 🏃‍♂️Initialization
        • 👮Attestation
        • ⚙️Configuration
    • Intel TDX
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
          • VT
          • TME/MKTME
          • SGX
        • Features
        • Threat Model
        • Concepts
          • Architecture
            • TDX Module
          • Memory Encryption
            • Confidentiality and Integrity
            • Keys and Key Management
          • TD Partitioning
          • DCAP-Attestation
            • Overview
            • Platform Registration
            • Attestation Report
    • AMD SEV
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
        • Threat Model
        • SME Concepts
          • Use Models
        • SEV-SNP Concepts
          • Features
            • Integrity Threats
            • Reverse Map Table
            • Page Validation
            • Page States
            • Virtual Machine Privilege Levels
            • Interrupt/Exception Protection
            • Trusted Platform Information
            • TCB Versioning
            • VM Launch & Attestation
            • VM Migration
            • Side Channels
          • Use Cases
          • Architecture
            • Encrypted Memory
            • Key Management
          • Software Implications
    • ARM CC
      • Technology
        • Introduction
        • Threat Model
        • Design
        • Comparison
    • Attestation Methods
      • Raw Attestation
      • Raw Attestation with Secure-Boot
      • Raw Attestation with a vTPM
        • AMD Secure VM Service Module and vTPMs
      • Raw Attestation with paravirtualized TPM
  • Resources
    • Youtube
    • Github
    • Products
Powered by GitBook
On this page

Was this helpful?

  1. Confidential Computing

Cloud Service Providers

Last Update: July 2023

Last updated 1 year ago

Was this helpful?

Each cloud provider implements confidential computing using various hardware-based security technologies and may have additional platform-specific features and services. These offerings provide customers with options to run their sensitive workloads in a secure and isolated environment, protecting their data and ensuring confidentiality, integrity, and privacy in the cloud.

Azure Confidential Computing leverages Intel SGX technology and AMD SEV technology. Azure offers several products for confidential computing, including Confidential VMs with Application Enclaves, which protect data by encrypting and isolating it in memory during CPU processing. Confidential VMs provide an easy way to deploy confidential workloads without requiring changes to existing applications or code. Confidential containers are also available, allowing containerized applications to be deployed and managed with a fully managed Kubernetes service.

Additionally, Azure offers other products that enhance confidential computing capabilities, such as SQL Azure Always Encrypted, which enables in-place encryption and confidential queries. Trusted launch improves the security of generation 2 VMs by protecting against advanced and persistent attack techniques. Azure confidential ledger provides a tamperproof data store hosted in trusted execution environments (TEEs) with cryptographically verifiable evidence. Microsoft Azure Attestation allows for the remote verification of platform trustworthiness and binary integrity. Azure Key Vault M-HSM safeguards cryptographic keys and other secrets cloud applications and services use.

GCP Confidential Computing Platform offers various features to protect the confidentiality of data in the cloud and enable secure processing. Confidential VMs encrypt data while it's being processed, Confidential GKE Nodes provide encryption in-use for GKE clusters, Confidential Space allows for collaborative analysis of sensitive data while maintaining confidentiality, Confidential Dataflow supports encrypted data processing pipelines, and Confidential Dataproc enables secure big data processing with inline memory encryption. These features utilize AMD SEV for enhanced data protection.

AWS Nitro Enclaves is a feature that allows users to create isolated compute environments within Amazon EC2 instances to securely process highly sensitive data such as personally identifiable information (PII), healthcare data, financial data, and intellectual property. Nitro Enclaves utilizes the Nitro Hypervisor technology, which provides CPU and memory isolation for EC2 instances, to further isolate the CPU and memory of the enclave from the parent instance. Nitro Enclaves is processor agnostic, and it is supported on most Intel, AMD, and AWS Graviton-based Amazon EC2 instance types built on the AWS Nitro System.

Note: As of 10 November 2022, the IBM Cloud Data Shield service is .

IBM Cloud Data Shield is a runtime protection offering that utilizes Intel SGX to encrypt data while in use for containerized workloads on IBM Cloud Kubernetes Service and Red Hat OpenShift. It extends data security with a Zero Trust Architecture and supports C, C++, Python, and Java programming languages. It can be used for various applications, cryptographic key management, enhancing blockchain privacy, multi-party computation, content protection, edge computing, and digital wallets, ensuring data sensitivity, compliance, and privacy in the cloud.

Alibaba Cloud introduced the trusted and virtualized Elastic Compute Service (ECS) instance that supports SGX 2.0 (Software Guard Extensions) and TPM (Trusted Platform Module). The instance offers larger EPC memory and a remote attestation service, enabling efficient computing with large datasets and providing enhanced data protection for financial and internet-based applications. Alibaba Cloud has been actively promoting SGX technology, including launching cryptographic computing solutions and collaborating with universities and enterprises to cultivate SGX application developers. Their efforts aim to build a robust ecosystem and improve chip-level data security in the cloud infrastructure.

OVH Cloud offers Secure Enclaves, which provide secure execution environments for sensitive workloads. OVH Cloud utilizes Intel SGX technology to protect data and computations within enclaves, ensuring confidentiality and integrity.

Azure Confidential Computing
Google Cloud Platform (GCP) Confidential Computing
Amazon Web Services (AWS) Nitro Enclaves
IBM Cloud Data Shield
deprecated
Alibaba Cloud Confidential Computing
OVH Cloud Secure Enclaves