SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Confidential Computing
Comprehensive portfolio
to protect sensitive data
—
May 2021
Mark Argent
IBM
Confidential Computing
from CIO’s POV
Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 2
Business needs:
– Meet regulatory compliance
requirements and reduce costs
of doing so
– Complete authority over sensitive data
and associated workloads, especially
hybrid apps
– Move to cloud, but manage
sensitive and confidential data
– Ensure data privacy including
for AI/ML and sensitive data
Complex regulations
and data privacy
Increasing cybersecurity
and data breaches
Technical
assurance
Operational
assurance
“Cloud provider will not
access your data”
Regulated clients require technical assurance.
Operational assurance is not sufficient.
Confidential Computing, Analyst Briefing / © 2021 IBM Corporation 3
“Cloud provider cannot
access your data”
Data Service
Objects
Objects
Cloud operator
Customer
Control
Visibility
Data Service
Objects
Objects
Cloud operator
Customer
Confidential
Computing
https://www.ibm.com/cloud/learn/confidential-computing
Data in Use
User interface
(e.g. website)
Application user
Data service
(e.g. database)
Application
(e.g. cloud service)
Data at Rest
(e.g. on a filesystem)
Key
Management
(KMS)
Data at Rest
Data in Transit
Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 4
Confidential Computing is about ‘Data in Use’
Industry view
Confidential Computing Consortium
Definition https://confidentialcomputing.io/
Confidential Computing, Analyst Briefing/ November, 2020 / © 2020 IBM Corporation 5
Confidential Computing add data in use protection to data at rest and in transit
protections, by performing computation in a hardware-basedTrusted Execution
Environment. These secure and isolated environments prevent unauthorized access
or modification of applications and data while in use, increasing the security
assurances for organizations that manage sensitive and regulated data.
Why is Hardware Necessary for Confidential Computing
Security is only as strong as the layers below it, since security in any layer of the
compute stack could potentially be circumvented by a breach at an underlying layer.
This drives the need for security solutions at the lowest layers possible, down to
the silicon components of the hardware.
The Scope of Confidential Computing
(from the consortium)
Confidential Computing, Analyst Briefing / November, 2020 / © 2020 IBM Corporation 6
• Software attacks. Software attacks include attacks on the operating system, hypervisor, BIOS,
other software and stacks.
• Protocol attacks. Protocol attacks include side attacks on protocols associated with
attestation as well as workload and data transport.
• Cryptographic attacks. Cryptography is an evolving discipline, with vulnerabilities being
found over time in ciphers and algorithms, including mathematical breakthroughs, availability of
computing power, and new computing approaches such as quantum computing. In some cases,
defense-in-depth may be appropriate, for instance employing quantum- resistant cryptography
within TEE instances whose implementation is not itself quantum-resistant.
• Basic physical attacks. considered in-scope: cold DRAM extraction, bus and cache
monitoring and plugging of attack devices into an existing port, e.g., PCIe, Firewire, USB-C.
Leveraging secure
enclaves in IBM z15
Leveraging secure
enclaves in Intel SGX
Purpose built offerings from IBM spanning
compute, containers, databases and crypto
Confidential Computing, Analyst Briefing / © 2021 IBM Corporation 7
IBM Cloud Hyper
Protect Crypto Services
Data encryption & TLS
offloading with
“Keep Your Own Key”
IBM Cloud Hyper
Protect Virtual Servers
Confidential servers
for workloads
IBM Cloud Hyper
Protect DBaaS
Confidential
databases
IBM Cloud
Data Shield
Confidential containers
for microservices
Data in Use
User interface
(e.g. website)
Application user
Data service
(e.g. database)
Application
(e.g. cloud service)
Data at Rest
(e.g. on a filesystem)
Hyper
Protect
Crypto
Service
Keep
Your
Own
Key
(KYOK)
Data at Rest
Data in Transit
Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 8
IBM Cloud Hyper Protect
Crypto Services
IBM Cloud Hyper Protect Virtual
Servers
IBM Cloud Hyper Protect
DBaaS
IBM Cloud Data Shield
Confidential compute enables total privacy assurance
IBM view
Cloud services:
IBM perspective
IBM Cloud Azure AWS GCP
Confidential Compute Services  Data Shield servers
Hyper Protect Virtual Server
  
Confidential Database Services  Hyper Protect PostgreSQL
Hyper Protect Mongo DB EE
— X X
Confidential Crypto/
Key Management Services (KYOK)
 Hyper Protect Crypto Services X X X
Confidential Containers  Data Shield IKS/ROKS X X X
Secure Build / DevSecOps for
Confidential Computing
 Hyper Protect Virtual Server
With Bring Your Own Image
 X X
Client References   X X
Supported
— Alternative approach
X Not supported
Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 9
*Always encrypt
Confidential Computing - TEE
On Premise
Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 10
Intel SGX &TPM
AMD EPYC
IBM
VMWare
https://confidentialcomputing.io/white-papers/
Power 10 EPC
Hyperledger
Thales+
Microsoft 365
Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne
Z
/
LinuxOne
Z
/
LinuxOne
Z / LinuxOne Z / LinuxOne
Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne
Z / LinuxOne
On Premise
Confidential Computing: Options
for protecting application data in
memory
Can the application be containerized ?
vSphere 7 Pods
IBM Secure Execution
for Linux
IBM LinuxONE
IBM z15
Can the protected enclave be limited to 128MB
?
Intel Software Guard
Extensions (SGX)
Application isolation
Yes
VM isolation
VM isolation
Container isolation
Supports secrets built
into enclave;
Support for memory
overcommit
No
Yes
No Yes
IBM Hyper Protect Virtual
Servers (HPVS)
IBM LinuxONE
IBM z15
Container isolation
Established toolchain
(inc. IBM HSM - KYOK);
Support for memory
overcommit
Yes No
* Majority of modern languages/hosting deployable without change
• Java ‘out of the box’ provided using right JDK
• NodeJS / Javascript
• ISV Software is usually recompiled already.
• Many open-source software already available.
• CLR for .Net applications ( targeted Q4 ‘21 )
Willing to change the application design/code to use protected enclave ?
Can the application be deployed on s390x architecture ? *
Can the application be containerized ?
No
vSphere 7
Linux KVM
Limited to 92MB
memory (vSphere
vSGX);
Vendor specific
implementation;
Only specified memory
is protected
AMD Secure Encrypted
Virtualization -
Encrypted State
(SEV-ES)
AMD Secure Encrypted
Virtualization -
Encrypted State
(SEV-ES)
s390x
x86
Can’t overcommit memory
allocated to VMs;
Vulnerabilities in all but
latest processors
Can’t overcommit memory
allocated to Containers;
Vulnerabilities in all but
latest processors
Yes No
Hybrid Cloud : On Premise and
Public Cloud Services Confidential
Computing: Options for
protecting application data in
memory
IBM Secure Execution
for Linux
IBM LinuxONE
IBM z15
VM isolation
Supports secrets
built into enclave;
Support for memory
overcommit
IBM Hyper Protect
Virtual Servers (HPVS)
IBM LinuxONE
IBM z15
Container
isolation
Established toolchain
(inc. IBM HSM -
KYOK);
Support for memory
overcommit
Able to leverage services from the public cloud to combine with On Premise
implementation ?
IBM Cloud Data Shield
IBM Cloud Hyper
Protect DBaaS
IBM Cloud Hyper
Protect Crypto Services
Public cloud DBaaS
Public cloud Crypto
service
Virtual Servers Containers
IBM Cloud Hyper
Protect Virtual Servers
Able to Develop and Test on the public cloud ?
s390x - On Premise IBM Cloud services
LinuxONE virtual
servers
Only service in the
industry that’s built
on FIPS 140-2 Level
4-certified hardware;
Keep Your Own Key
(KYOK)
MongoDB
PostgreSQL
FIPS 140.2 HSM
Run containerized
applications in a
secure enclave on
Kubernetes;
Secure enclaves
using Intel SGX and
Fortanix
Fully managed
database on
LinuxONE;
Control encryption
keys with Crypto
Services
On Premise Confidential Computing
Confidential Computing © 2021 IBM Corporation 13

More Related Content

PPTX
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
PPTX
Cloud Audit and Compliance
PPTX
Cloud Security Architecture.pptx
PPTX
Chap 6 cloud security
PPTX
New technologies for data protection
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
Cloud Security, Standards and Applications
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
(ISC)2 CCSP - Certified Cloud Security Professional
Cloud Audit and Compliance
Cloud Security Architecture.pptx
Chap 6 cloud security
New technologies for data protection
Secure by Design - Security Design Principles for the Rest of Us
Cloud Security, Standards and Applications

What's hot (20)

PDF
An Architectural Deep Dive With Kubernetes And Containers Powerpoint Presenta...
PDF
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
PPTX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
PDF
Introduction of Kubernetes - Trang Nguyen
PPTX
Azure Security Fundamentals
PPTX
Migrating Java JBoss EAP Applications to Kubernetes With S2I
PDF
Intro to open source observability with grafana, prometheus, loki, and tempo(...
PDF
Elastic Observability keynote
PDF
DevSecOps What Why and How
PDF
Cluster-as-code. The Many Ways towards Kubernetes
PDF
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
PDF
ArgoCD Meetup PPT final.pdf
PDF
What Is Helm
PDF
Slide DevSecOps Microservices
PPTX
Microservices Architecture - Bangkok 2018
PDF
Azure Security Overview
PPT
What is load balancer in aws and types of load balancers
PDF
Autoscaling Kubernetes
PDF
Istio Service Mesh
PPTX
Scaling production grade EKS Multi-Cluster environments using GitOps
An Architectural Deep Dive With Kubernetes And Containers Powerpoint Presenta...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
Introduction of Kubernetes - Trang Nguyen
Azure Security Fundamentals
Migrating Java JBoss EAP Applications to Kubernetes With S2I
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Elastic Observability keynote
DevSecOps What Why and How
Cluster-as-code. The Many Ways towards Kubernetes
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
ArgoCD Meetup PPT final.pdf
What Is Helm
Slide DevSecOps Microservices
Microservices Architecture - Bangkok 2018
Azure Security Overview
What is load balancer in aws and types of load balancers
Autoscaling Kubernetes
Istio Service Mesh
Scaling production grade EKS Multi-Cluster environments using GitOps
Ad

Similar to Confidential Computing overview (20)

PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPT
Data security in the cloud
PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PDF
Trust in a Digital World
PDF
Presentation cloud security the grand challenge
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PPTX
Practical advice for cloud data protection ulf mattsson - jun 2014
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
PDF
Where Data Security and Value of Data Meet in the Cloud
PDF
Where data security and value of data meet in the cloud ulf mattsson
PDF
Z111806 strengthen-security-sydney-v1910a
PDF
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PPTX
Practical risk management for the multi cloud
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PDF
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
PDF
Z110932 strengthen-security-jburg-v1909c
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
Where data security and value of data meet in the cloud brighttalk webinar ...
Data security in the cloud
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Trust in a Digital World
Presentation cloud security the grand challenge
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Cloud data governance, risk management and compliance ny metro joint cyber...
Practical advice for cloud data protection ulf mattsson - jun 2014
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Where Data Security and Value of Data Meet in the Cloud
Where data security and value of data meet in the cloud ulf mattsson
Z111806 strengthen-security-sydney-v1910a
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
IBM: Cognitive Security Transformation for the Enrgy Sector
Practical risk management for the multi cloud
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Cloud Security: What you need to know about IBM SmartCloud Security
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Z110932 strengthen-security-jburg-v1909c
The day when 3rd party security providers disappear into cloud bright talk se...
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...

Confidential Computing overview

  • 1. Confidential Computing Comprehensive portfolio to protect sensitive data — May 2021 Mark Argent IBM
  • 2. Confidential Computing from CIO’s POV Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 2 Business needs: – Meet regulatory compliance requirements and reduce costs of doing so – Complete authority over sensitive data and associated workloads, especially hybrid apps – Move to cloud, but manage sensitive and confidential data – Ensure data privacy including for AI/ML and sensitive data Complex regulations and data privacy Increasing cybersecurity and data breaches
  • 3. Technical assurance Operational assurance “Cloud provider will not access your data” Regulated clients require technical assurance. Operational assurance is not sufficient. Confidential Computing, Analyst Briefing / © 2021 IBM Corporation 3 “Cloud provider cannot access your data” Data Service Objects Objects Cloud operator Customer Control Visibility Data Service Objects Objects Cloud operator Customer
  • 4. Confidential Computing https://www.ibm.com/cloud/learn/confidential-computing Data in Use User interface (e.g. website) Application user Data service (e.g. database) Application (e.g. cloud service) Data at Rest (e.g. on a filesystem) Key Management (KMS) Data at Rest Data in Transit Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 4 Confidential Computing is about ‘Data in Use’ Industry view
  • 5. Confidential Computing Consortium Definition https://confidentialcomputing.io/ Confidential Computing, Analyst Briefing/ November, 2020 / © 2020 IBM Corporation 5 Confidential Computing add data in use protection to data at rest and in transit protections, by performing computation in a hardware-basedTrusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while in use, increasing the security assurances for organizations that manage sensitive and regulated data. Why is Hardware Necessary for Confidential Computing Security is only as strong as the layers below it, since security in any layer of the compute stack could potentially be circumvented by a breach at an underlying layer. This drives the need for security solutions at the lowest layers possible, down to the silicon components of the hardware.
  • 6. The Scope of Confidential Computing (from the consortium) Confidential Computing, Analyst Briefing / November, 2020 / © 2020 IBM Corporation 6 • Software attacks. Software attacks include attacks on the operating system, hypervisor, BIOS, other software and stacks. • Protocol attacks. Protocol attacks include side attacks on protocols associated with attestation as well as workload and data transport. • Cryptographic attacks. Cryptography is an evolving discipline, with vulnerabilities being found over time in ciphers and algorithms, including mathematical breakthroughs, availability of computing power, and new computing approaches such as quantum computing. In some cases, defense-in-depth may be appropriate, for instance employing quantum- resistant cryptography within TEE instances whose implementation is not itself quantum-resistant. • Basic physical attacks. considered in-scope: cold DRAM extraction, bus and cache monitoring and plugging of attack devices into an existing port, e.g., PCIe, Firewire, USB-C.
  • 7. Leveraging secure enclaves in IBM z15 Leveraging secure enclaves in Intel SGX Purpose built offerings from IBM spanning compute, containers, databases and crypto Confidential Computing, Analyst Briefing / © 2021 IBM Corporation 7 IBM Cloud Hyper Protect Crypto Services Data encryption & TLS offloading with “Keep Your Own Key” IBM Cloud Hyper Protect Virtual Servers Confidential servers for workloads IBM Cloud Hyper Protect DBaaS Confidential databases IBM Cloud Data Shield Confidential containers for microservices
  • 8. Data in Use User interface (e.g. website) Application user Data service (e.g. database) Application (e.g. cloud service) Data at Rest (e.g. on a filesystem) Hyper Protect Crypto Service Keep Your Own Key (KYOK) Data at Rest Data in Transit Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 8 IBM Cloud Hyper Protect Crypto Services IBM Cloud Hyper Protect Virtual Servers IBM Cloud Hyper Protect DBaaS IBM Cloud Data Shield Confidential compute enables total privacy assurance IBM view
  • 9. Cloud services: IBM perspective IBM Cloud Azure AWS GCP Confidential Compute Services  Data Shield servers Hyper Protect Virtual Server    Confidential Database Services  Hyper Protect PostgreSQL Hyper Protect Mongo DB EE — X X Confidential Crypto/ Key Management Services (KYOK)  Hyper Protect Crypto Services X X X Confidential Containers  Data Shield IKS/ROKS X X X Secure Build / DevSecOps for Confidential Computing  Hyper Protect Virtual Server With Bring Your Own Image  X X Client References   X X Supported — Alternative approach X Not supported Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 9 *Always encrypt
  • 10. Confidential Computing - TEE On Premise Confidential Computing, Analyst Briefing/ © 2021 IBM Corporation 10 Intel SGX &TPM AMD EPYC IBM VMWare https://confidentialcomputing.io/white-papers/ Power 10 EPC Hyperledger Thales+ Microsoft 365 Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne Z / LinuxOne
  • 11. On Premise Confidential Computing: Options for protecting application data in memory Can the application be containerized ? vSphere 7 Pods IBM Secure Execution for Linux IBM LinuxONE IBM z15 Can the protected enclave be limited to 128MB ? Intel Software Guard Extensions (SGX) Application isolation Yes VM isolation VM isolation Container isolation Supports secrets built into enclave; Support for memory overcommit No Yes No Yes IBM Hyper Protect Virtual Servers (HPVS) IBM LinuxONE IBM z15 Container isolation Established toolchain (inc. IBM HSM - KYOK); Support for memory overcommit Yes No * Majority of modern languages/hosting deployable without change • Java ‘out of the box’ provided using right JDK • NodeJS / Javascript • ISV Software is usually recompiled already. • Many open-source software already available. • CLR for .Net applications ( targeted Q4 ‘21 ) Willing to change the application design/code to use protected enclave ? Can the application be deployed on s390x architecture ? * Can the application be containerized ? No vSphere 7 Linux KVM Limited to 92MB memory (vSphere vSGX); Vendor specific implementation; Only specified memory is protected AMD Secure Encrypted Virtualization - Encrypted State (SEV-ES) AMD Secure Encrypted Virtualization - Encrypted State (SEV-ES) s390x x86 Can’t overcommit memory allocated to VMs; Vulnerabilities in all but latest processors Can’t overcommit memory allocated to Containers; Vulnerabilities in all but latest processors Yes No
  • 12. Hybrid Cloud : On Premise and Public Cloud Services Confidential Computing: Options for protecting application data in memory IBM Secure Execution for Linux IBM LinuxONE IBM z15 VM isolation Supports secrets built into enclave; Support for memory overcommit IBM Hyper Protect Virtual Servers (HPVS) IBM LinuxONE IBM z15 Container isolation Established toolchain (inc. IBM HSM - KYOK); Support for memory overcommit Able to leverage services from the public cloud to combine with On Premise implementation ? IBM Cloud Data Shield IBM Cloud Hyper Protect DBaaS IBM Cloud Hyper Protect Crypto Services Public cloud DBaaS Public cloud Crypto service Virtual Servers Containers IBM Cloud Hyper Protect Virtual Servers Able to Develop and Test on the public cloud ? s390x - On Premise IBM Cloud services LinuxONE virtual servers Only service in the industry that’s built on FIPS 140-2 Level 4-certified hardware; Keep Your Own Key (KYOK) MongoDB PostgreSQL FIPS 140.2 HSM Run containerized applications in a secure enclave on Kubernetes; Secure enclaves using Intel SGX and Fortanix Fully managed database on LinuxONE; Control encryption keys with Crypto Services On Premise Confidential Computing
  • 13. Confidential Computing © 2021 IBM Corporation 13

Editor's Notes

  • #3: Use cases from IBM CIO Office perspective: Risk analysis and business case approach (expected cost of a breach as costs are shifting meaning more breaches and more expensive breaches, vs. expected cost of security) IT use cases where there is particular relevance Increasing scope of encryption when workloads are migrated to private cloud Hybrid workloads where sensitive data moves across cloud and on-prem Support increased security for region-specific data-sensitive workloads in the cloud AI and ML use cases; and data in a Z environment
  • #5: The next frontier of data protection: When we talk about end to end data protection, we are talking about the three pillars of data security. Data at rest: Files stored on servers, records in databases, etc. Protecting data at rest means using methods such as encryption, anti virus, and firewalls so a malicious actor can’t access information inactive data being stored on a device or network.  Data in transit: Information as it moves between servers and applications such as emails and instant messaging. For protecting data in transit, enterprises often choose to encrypt sensitive data prior to moving the data via encryption protocols like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) transactions in and out of a server. There are technologies that exist today on the LinuxONE III machine that protect these two states of data and code such as Pervasive Encryption for general LinuxONE workloads, hardware-accelerated technologies and Hyper Protect services. Additional (CPACF coprocessor - to perform the encryption and decryption, Crypto Express Card – to store and present the master key used to encrypt and decrypt the data) However, what is lacking today is protecting the third pillar of data security: Data in use. Data in use: Data in use is data that is being processed by a running application or being accessed by a user. Ex. various applications such as Banking Software, Java Applications, Databases that are all running and may have open sensitive files.  Confidential computing: So, how do we protect data while it is in use? Tech companies are adopting a new security model that they’re calling confidential computing that uses hardware-based techniques (emphasize) to protect data in use. The key is controlling access to the data as tightly as possible and to provide a way to securely process unencrypted data. Keep in mind, the protection of these data states are complementary and do not supersede or replace the other existing protections. So to recap - today, data is often protected at rest and in transit, but not while in use by applications. And, in order to implement technical assurance, end to end protection must be achieved. As a result, organizations with applications that handle sensitive data such as financial transactions, or health information are often unable to take advantage of the benefits of cloud and multi-party computing.
  • #8: The IBM Secure Service Container architecture exploits the Crypto Express6S HSMs so that institutions can run Docker containerized applications and micro-services in an industry unique, FIPS 197 compliant, trusted, cryptographically isolated execution environment with up to 16TB of real memory available.
  • #9: The next frontier of data protection: When we talk about end to end data protection, we are talking about the three pillars of data security. Data at rest: Files stored on servers, records in databases, etc. Protecting data at rest means using methods such as encryption, anti virus, and firewalls so a malicious actor can’t access information inactive data being stored on a device or network.  Data in transit: Information as it moves between servers and applications such as emails and instant messaging. For protecting data in transit, enterprises often choose to encrypt sensitive data prior to moving the data via encryption protocols like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) transactions in and out of a server. There are technologies that exist today on the LinuxONE III machine that protect these two states of data and code such as Pervasive Encryption for general LinuxONE workloads, hardware-accelerated technologies and Hyper Protect services. Additional (CPACF coprocessor - to perform the encryption and decryption, Crypto Express Card – to store and present the master key used to encrypt and decrypt the data) However, what is lacking today is protecting the third pillar of data security: Data in use. Data in use: Data in use is data that is being processed by a running application or being accessed by a user. Ex. various applications such as Banking Software, Java Applications, Databases that are all running and may have open sensitive files.  Confidential computing: So, how do we protect data while it is in use? Tech companies are adopting a new security model that they’re calling confidential computing that uses hardware-based techniques (emphasize) to protect data in use. The key is controlling access to the data as tightly as possible and to provide a way to securely process unencrypted data. Keep in mind, the protection of these data states are complementary and do not supersede or replace the other existing protections. So to recap - today, data is often protected at rest and in transit, but not while in use by applications. And, in order to implement technical assurance, end to end protection must be achieved. As a result, organizations with applications that handle sensitive data such as financial transactions, or health information are often unable to take advantage of the benefits of cloud and multi-party computing.
  • #10: GCP plans to support: Ubuntu v18.04, Ubuntu 20.04, Container Optimized OS (COS v81), and RHEL 8.2,