History
AMD Secure Encrypted Virtualization (SEV) and AMD Secure Memory Encryption (SME) are two security features designed to enhance the security of AMD processors.
In 2016, AMD unveiled Secure Encrypted Virtualization (SEV), an innovative x86 technology specifically designed to isolate virtual machines (VMs) from the hypervisor. Traditionally, hypervisors have been trusted components in the virtualization security model. However, there are numerous scenarios, such as cloud environments, where a different VM trust model is desired. Cloud customers may wish to safeguard their VM-based workloads from the cloud administrator to ensure data confidentiality and reduce their exposure to potential bugs in the cloud provider's infrastructure. This creates a need to physically isolate VMs from the hypervisor and other coexisting code on the server.
To address this challenge, AMD initially employed main memory encryption in SEV. This technology allowed each VM to be assigned a unique AES encryption key, automatically encrypting their in-use data. Consequently, when the hypervisor attempted to access a guest's memory, it could only see encrypted data.
In 2017, AMD introduced SEV-ES (Encrypted State), which added an extra layer of protection for CPU register state. SEV-ES encrypted the VM register state during each hypervisor transition, ensuring that the hypervisor could not access the actively used data by the VM. The combination of SEV and SEV-ES helped minimize the attack surface of a VM by preserving data confidentiality in memory.
In 2020, AMD introduced the next generation of SEV, known as SEV-SNP (Secure Nested Paging). SEV-SNP builds upon the existing SEV and SEV-ES functionalities while incorporating new hardware-based security measures. Its primary addition is strong memory integrity protection, which effectively thwarts malicious hypervisor-based attacks like data replay and memory re-mapping. This further strengthens the isolated execution environment.
Additionally, SEV-SNP includes various optional security enhancements to support different VM use models, offer more robust protection around interrupt behavior, and counteract recently disclosed side-channel attacks.
Last updated