Building a secure network of trusted applications on untrusted hosts
- Track: Confidential Computing devroom
- Room: D.confidential (online)
- Location: Online
- Day: Saturday
- Start: 16:00
- End: 16:25
- Video only: dconfidential
- Chat: Join the conversation!
Deploying to "the cloud" is incredibly convenient, but that convenience normally comes at a cost. The host necessarily becomes a major part of the applications trust domain, and a compromised host means a compromised application or a network of thereof. This prevents several highly-regulated sectors, such as medical or financial, from directly deploying to "the cloud" as opposed to building their own infrastructure. Solutions to this problem exist, but most require a custom and correct implementation tied to a particular hardware vendor and SDK. I will present a hardware-agnostic and cloud provider-agnostic solution to this issue, which, with minimal changes to the implementation, can be used to secure a network of applications and demonstrate strong trust assertions produced by doing so.
Speakers
Roman Volosatovs |
Links
- FOSS secure execution environment used for demonstration
- FOSS attestation service used for demonstration
- FOSS workload registry used for demonstration
- Enarx open-source project homepage
- Video recording (WebM/VP9)
- Video recording (mp4/aac)
- Chat room (web)
- Chat room (app)
- Hallway chat room (web)
- Hallway chat room (app)
- Submit feedback