Confidential Computing overview

IT Architect em IBM
10 de Jul de 2021
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
Confidential Computing overview
1 de 13

Mais conteúdo relacionado

Mais procurados

VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e DesignVMUG IT
Amazon Connect 概要 & 最新情報アップデートAmazon Connect 概要 & 最新情報アップデート
Amazon Connect 概要 & 最新情報アップデートAmazon Web Services Japan
VMware Cloud on AWSネットワーク詳細解説VMware Cloud on AWSネットワーク詳細解説
VMware Cloud on AWSネットワーク詳細解説Noritaka Kuroiwa
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...Amazon Web Services
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...Edureka!
워크로드 특성에 따른 안전하고 효율적인 Data Lake 운영 방안워크로드 특성에 따른 안전하고 효율적인 Data Lake 운영 방안
워크로드 특성에 따른 안전하고 효율적인 Data Lake 운영 방안Amazon Web Services Korea

Mais procurados(20)

Similar a Confidential Computing overview

Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
Dok Talks #140 - Data protection of stateful environmentDok Talks #140 - Data protection of stateful environment
Dok Talks #140 - Data protection of stateful environmentDoKC
Sklm webinarSklm webinar
Sklm webinarLuigi Perrone
IBM Cloud Paris Meetup - 20180628 - IBM Cloud PrivateIBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
IBM Cloud Paris Meetup - 20180628 - IBM Cloud PrivateIBM France Lab
What is needed in the next generation cloud trusted platform ?What is needed in the next generation cloud trusted platform ?
What is needed in the next generation cloud trusted platform ?Priyanka Aash
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17LennartF

Similar a Confidential Computing overview(20)

Último

The Rise of the Machines: How AI will shape our lives in 2024The Rise of the Machines: How AI will shape our lives in 2024
The Rise of the Machines: How AI will shape our lives in 2024Iain Martin
Improving Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft ...Improving Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft ...
Improving Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft ...ThousandEyes
2023 Ivanti September Patch Tuesday2023 Ivanti September Patch Tuesday
2023 Ivanti September Patch TuesdayIvanti
Fipto Seed Pitch DeckFipto Seed Pitch Deck
Fipto Seed Pitch Decksjcobrien
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
ContainerDays Hamburg 2023 — Cilium Workshop.pdfContainerDays Hamburg 2023 — Cilium Workshop.pdf
ContainerDays Hamburg 2023 — Cilium Workshop.pdfRaphaël PINSON

Último(20)

Confidential Computing overview

Notas do Editor

  1. Use cases from IBM CIO Office perspective: Risk analysis and business case approach (expected cost of a breach as costs are shifting meaning more breaches and more expensive breaches, vs. expected cost of security) IT use cases where there is particular relevance Increasing scope of encryption when workloads are migrated to private cloud Hybrid workloads where sensitive data moves across cloud and on-prem Support increased security for region-specific data-sensitive workloads in the cloud AI and ML use cases; and data in a Z environment
  2. The next frontier of data protection: When we talk about end to end data protection, we are talking about the three pillars of data security. Data at rest: Files stored on servers, records in databases, etc. Protecting data at rest means using methods such as encryption, anti virus, and firewalls so a malicious actor can’t access information inactive data being stored on a device or network.  Data in transit: Information as it moves between servers and applications such as emails and instant messaging. For protecting data in transit, enterprises often choose to encrypt sensitive data prior to moving the data via encryption protocols like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) transactions in and out of a server. There are technologies that exist today on the LinuxONE III machine that protect these two states of data and code such as Pervasive Encryption for general LinuxONE workloads, hardware-accelerated technologies and Hyper Protect services. Additional (CPACF coprocessor - to perform the encryption and decryption, Crypto Express Card – to store and present the master key used to encrypt and decrypt the data) However, what is lacking today is protecting the third pillar of data security: Data in use. Data in use: Data in use is data that is being processed by a running application or being accessed by a user. Ex. various applications such as Banking Software, Java Applications, Databases that are all running and may have open sensitive files.  Confidential computing: So, how do we protect data while it is in use? Tech companies are adopting a new security model that they’re calling confidential computing that uses hardware-based techniques (emphasize) to protect data in use. The key is controlling access to the data as tightly as possible and to provide a way to securely process unencrypted data. Keep in mind, the protection of these data states are complementary and do not supersede or replace the other existing protections. So to recap - today, data is often protected at rest and in transit, but not while in use by applications. And, in order to implement technical assurance, end to end protection must be achieved. As a result, organizations with applications that handle sensitive data such as financial transactions, or health information are often unable to take advantage of the benefits of cloud and multi-party computing.
  3. The IBM Secure Service Container architecture exploits the Crypto Express6S HSMs so that institutions can run Docker containerized applications and micro-services in an industry unique, FIPS 197 compliant, trusted, cryptographically isolated execution environment with up to 16TB of real memory available.
  4. The next frontier of data protection: When we talk about end to end data protection, we are talking about the three pillars of data security. Data at rest: Files stored on servers, records in databases, etc. Protecting data at rest means using methods such as encryption, anti virus, and firewalls so a malicious actor can’t access information inactive data being stored on a device or network.  Data in transit: Information as it moves between servers and applications such as emails and instant messaging. For protecting data in transit, enterprises often choose to encrypt sensitive data prior to moving the data via encryption protocols like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) transactions in and out of a server. There are technologies that exist today on the LinuxONE III machine that protect these two states of data and code such as Pervasive Encryption for general LinuxONE workloads, hardware-accelerated technologies and Hyper Protect services. Additional (CPACF coprocessor - to perform the encryption and decryption, Crypto Express Card – to store and present the master key used to encrypt and decrypt the data) However, what is lacking today is protecting the third pillar of data security: Data in use. Data in use: Data in use is data that is being processed by a running application or being accessed by a user. Ex. various applications such as Banking Software, Java Applications, Databases that are all running and may have open sensitive files.  Confidential computing: So, how do we protect data while it is in use? Tech companies are adopting a new security model that they’re calling confidential computing that uses hardware-based techniques (emphasize) to protect data in use. The key is controlling access to the data as tightly as possible and to provide a way to securely process unencrypted data. Keep in mind, the protection of these data states are complementary and do not supersede or replace the other existing protections. So to recap - today, data is often protected at rest and in transit, but not while in use by applications. And, in order to implement technical assurance, end to end protection must be achieved. As a result, organizations with applications that handle sensitive data such as financial transactions, or health information are often unable to take advantage of the benefits of cloud and multi-party computing.
  5. GCP plans to support: Ubuntu v18.04, Ubuntu 20.04, Container Optimized OS (COS v81), and RHEL 8.2,