📃
Confidential Computing 101
HomeTechnologyTry CC!
  • Welcome
  • Confidential Computing
    • What is Confidential Computing
    • What problems Confidential Computing solves
      • Bare Metal
      • Docker
      • Kubernetes
      • Knative
    • Why Confidential Computing
    • How Confidential Computing works
      • Memory Encryption
      • Workload Attestation
      • Confidential Boot
      • Sealing / Binding
      • Secret Provisioning
    • Technology Overview
    • Cloud Service Providers
  • Technology in depth
    • Intel SGX
      • Getting Started
        • Bare Metal Server Installation
        • Enclave Development Environment
        • Intel SGX SDK Setup
      • Technology
        • 🎭Features
        • 💂Threat Model
        • 🆚Versions
        • 🟦Concepts
          • 🏦Memory Encryption
          • 👮Local and Remote Attestation
          • 🖼️DCAP-Attestation Framework
          • 🔑Secret Key Provisioning
      • enclaive Development Kit
        • 🏢Architecture
        • 🌪️Workflow
        • 🌍Tutorials
          • Azure DCdsv3, DCsv2, or DCsv3 Setup
          • Redis in cK8s
          • MongoDB in cK8s
          • K8s + HashiCorp Vault on Azure DCsv3
      • Vault Remote Attestation Plug-In
        • 🏃‍♂️Initialization
        • 👮Attestation
        • ⚙️Configuration
    • Intel TDX
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
          • VT
          • TME/MKTME
          • SGX
        • Features
        • Threat Model
        • Concepts
          • Architecture
            • TDX Module
          • Memory Encryption
            • Confidentiality and Integrity
            • Keys and Key Management
          • TD Partitioning
          • DCAP-Attestation
            • Overview
            • Platform Registration
            • Attestation Report
    • AMD SEV
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
        • Threat Model
        • SME Concepts
          • Use Models
        • SEV-SNP Concepts
          • Features
            • Integrity Threats
            • Reverse Map Table
            • Page Validation
            • Page States
            • Virtual Machine Privilege Levels
            • Interrupt/Exception Protection
            • Trusted Platform Information
            • TCB Versioning
            • VM Launch & Attestation
            • VM Migration
            • Side Channels
          • Use Cases
          • Architecture
            • Encrypted Memory
            • Key Management
          • Software Implications
    • ARM CC
      • Technology
        • Introduction
        • Threat Model
        • Design
        • Comparison
    • Attestation Methods
      • Raw Attestation
      • Raw Attestation with Secure-Boot
      • Raw Attestation with a vTPM
        • AMD Secure VM Service Module and vTPMs
      • Raw Attestation with paravirtualized TPM
  • Resources
    • Youtube
    • Github
    • Products
Powered by GitBook
On this page

Was this helpful?

  1. Technology in depth
  2. ARM CC

Technology

Last updated 11 months ago

Was this helpful?

COMING SOON!

The official overview:

ARM Confidential Compute Architecture (CCA) is an approach to securing sensitive data and computations within the ARM ecosystem. It provides a framework for executing trusted code and protecting data confidentiality, integrity, and privacy, even in the presence of potentially compromised software layers or untrusted environments.

The goal of ARM CCA is to enable secure computing across a range of devices, including edge devices, IoT devices, smartphones, servers, and cloud environments. It leverages ARM's hardware-based security features, such as TrustZone technology, to establish isolated execution environments called secure enclaves. These secure enclaves provide a protected space where sensitive code and data can be executed and stored, shielding them from unauthorized access and tampering.

ARM CCA builds on the foundation of ARM TrustZone, which divides the processor's resources into secure and non-secure worlds. The secure world is isolated from the non-secure world, creating a trusted execution environment (TEE) where critical operations can be performed. ARM CCA extends this concept by introducing additional security features and capabilities to further enhance the protection of sensitive data and computations.

Some key components and features of ARM CCA include:

Secure Enclaves

These are isolated execution environments within the secure world where sensitive code and data reside. They provide strong isolation from the non-secure world and enable secure computations.

Trusted Applications

These are software components that run within the secure enclaves and perform trusted operations. They can be developed using trusted programming languages and libraries to ensure their integrity and security.

Secure Storage

ARM CCA provides mechanisms to securely store sensitive data within the secure enclaves, protecting it from unauthorized access or tampering.

Secure Communication

ARM CCA enables secure communication channels between trusted applications running in separate secure enclaves or between secure enclaves and external entities. This ensures the confidentiality and integrity of data exchanged between them.

Attestation and Remote Attestation

ARM CCA incorporates mechanisms for verifying the integrity and authenticity of secure enclaves. Attestation allows external entities to validate the identity and integrity of a secure enclave, while remote attestation enables the verification of secure enclaves over a network.

ARM CCA provides a foundation for building secure and trusted systems within the ARM ecosystem. It enables the development of applications and services that can securely process sensitive data, protect intellectual property, and ensure the confidentiality and integrity of computations. By leveraging hardware-based security features and strong isolation, ARM CCA enhances the overall security posture of ARM-based devices and platforms.

ARM Confidential Compute Architecture