Kubernetes
Kubernetes has faced criticism for weak container isolation, making it vulnerable to attacks due to inadequate patch management. This compromises node, pod, and workload isolation, posing concerns for Cloud Service Providers. Demonstrations have shown adversaries breaching the virtualization perimeter and compromising all virtualized nodes.
To address these issues, enclaive introduces Confidential Kubernetes (cK8s), which ensures fine-grained confidentiality by protecting workloads with encrypted, attested containers. The solution incorporates user-friendly Confidential Containers and a vault running in an enclave, simplifying deployment and management. Customers are responsible for their own Confidential Vault and Containers within a secure enclave-supported K8s cluster. Ownership verification of containers requires validating MRENCLAVE
and MRSIGNER
attributes for enhanced security.
Issues
Kubernetes poses two primary concerns for application confidentiality: security and privacy.
Solution
In response to these concerns, enclaive has introduced Confidential Kubernetes (cK8s), aiming to protect customers' workloads with the utmost precision. This solution focuses on achieving fine-grained confidentiality by safeguarding the workload at the level of confidential containers running within a pod.
Enclaive's Confidential Kubernetes cluster has been meticulously designed to simplify the deployment of confidential workloads while ensuring straightforward operation and management. Our primary objective was to incorporate existing tools, best practices, and the workflows DevOps professionals and engineers utilize in their day-to-day operations while minimizing the complexities associated with hardware secure enclaves. The fundamental components of this solution are as follows:
To ensure simplicity for our customers (engineers, DevOps), we have adopted the following role model:
The Cloud Service Provider (CSP) offers a K8s cluster with hardware secure enclave support, comprising:
Kubernetes nodes equipped with hardware secure enclave drivers
Access to the Provisioning Certification Service (PCS) through the Datacenter Provisioning Certification Caching Service (PCCS)
The customer's responsibilities include:
Building, deploying, and provisioning their own Confidential Vault within the cluster
Building, deploying, and provisioning their own Confidential Containers within the cluster
Any additional requirements typical in a non-enclaved setting
It is important to note that for customers to claim ownership of a container, they must possess the capability to verify the secure attributes, which are integral to the security of the solution.
Last updated