The Linux Foundation Projects
Skip to main content
Yearly Archives

2024

Announcing Invary’s Membership and Our New Start-Up Tier

By Announcement No Comments

We are thrilled to announce that Invary has joined the Confidential Computing Consortium (CCC) as a start-up member! Invary’s mission to protect people, organizations, and governments from hidden cyber threats aligns perfectly with our commitment to advancing secure computing technologies.

Invary brings a wealth of expertise in cyberthreat detection and mitigation, enhancing the Consortium’s efforts to foster secure, privacy-preserving computing environments. Their innovative solutions and dedication to cybersecurity will be invaluable as we work together to promote and develop open standards for confidential computing.

Invary’s remote attestation service enhances the security of Trusted Execution Environments (TEEs), ensuring data remains encrypted and inaccessible to unauthorized users during processing.

We look forward to collaborating with Invary to drive forward the adoption of confidential computing, ensuring robust protection against cyberthreats for all users. Welcome, Invary, to the Confidential Computing Consortium!

Jason Rogers, CEO of Invary, on joining the CCC said, “We are excited to join the Confidential Computing Consortium and look forward to collaborating with experts focused on data privacy and cybersecurity. We are grateful for the opportunity provided by the CCC’s Startup Program and eager to share our expertise in Runtime Integrity and Attestation.”

In addition to welcoming Invary, we are thrilled to introduce a new membership tier tailored specifically for start-ups. This initiative empowers emerging companies by offering them a unique opportunity to join the CCC community free of charge for the first 12 months. We are excited about the potential of this new offer and look forward to seeing the innovative contributions from start-ups.

Why This Matters

Confidential Computing is revolutionizing data protection and processing. The use of hardware-based techniques to isolate sensitive data ensures security even during processing. As the field evolves, collaboration and innovation become increasingly crucial to keep up with advancements. The CCC plays a pivotal role by uniting industry leaders, researchers, and innovators to drive the future of secure computing. This is a call for start-ups to join this collaborative effort and contribute to the future of secure computing.

Invary brings expertise in cyber threat detection and mitigation, enhancing the Consortium’s efforts to foster secure, privacy-preserving computing environments. Their innovative solutions and dedication to cybersecurity will be invaluable as we work together to promote and develop open standards for confidential computing.

Join Us

We look forward to collaborating with Invary to accelerate the adoption of confidential computing and ensure robust protection against cyber threats for all users. Welcome, Invary, to the Confidential Computing Consortium!

For start-ups interested in joining, our new membership tier provides an excellent opportunity to be part of a leading community in secure computing. Take advantage of this chance to contribute, collaborate, and innovate in Confidential Computing.

Welcome to the future of secure computing. Welcome to the CCC!

Confidential Computing Consortium Resources

The Challenges and Rewards of Confidential Computing

By Blog No Comments

Discover how Confidential Computing can revolutionize data security, compliance, and innovation by reading The Case for Confidential Computing by Suzanne Ambiel. This report offers valuable insights for business leaders looking to leverage this emerging technology to secure data in use and unlock new opportunities.

Who should read this report?

The target audience includes business leaders, IT professionals, and decision-makers across various industries. Specifically, it is aimed at CIOs, CTOs, CISOs, and data protection officers who are responsible for safeguarding sensitive data and ensuring compliance with data privacy regulations.

Anyone else?

Additionally, the report is relevant to healthcare providers, financial institutions, and marketing strategists seeking innovative solutions to securely process and collaborate on data. It also addresses technology vendors, cloud service providers, and enterprise architects interested in the latest advancements in secure data processing and trusted execution environments.

DOWNLOAD THE REPORT

Why is Confidential Computing important?

The protection and confidential processing of data are crucial for maintaining competitive advantage, regulatory compliance, and customer trust. The report offers comprehensive insights into how businesses across various industries can leverage Confidential Computing to secure data in use. This technology not only enhances data privacy and security but also unlocks new opportunities for cloud computing, multiparty data collaboration, and innovation. With the insights achieved from this report, business leaders will gain a clear understanding of how Confidential Computing can address the pressing challenges of data security, especially in the context of AI, cloud computing, and multiparty data collaboration.

Transformative benefits shown through real world examples

The report dives deep into industry-specific use cases, illustrating how Confidential Computing can transform operations in sectors like healthcare, financial services, and marketing. For instance, it explains how Confidential Computing enables secure data aggregation in healthcare, leading to better patient outcomes and more efficient research processes.

By exploring these use cases, readers will see how implementing Confidential Computing can lead to significant business benefits, including enhanced data security, compliance with global regulations, and improved operational efficiency. The report is a valuable resource for any organization looking to harness the full potential of its data while safeguarding it against modern cyber threats.

A surprising reward

One of the most surprising findings from the report relates to how financial institutions are leveraging Confidential Computing to combat money laundering. By securely pooling transaction data from multiple institutions in a Confidential Computing environment, these organizations can detect suspicious activities more effectively and comply with stringent anti-money laundering regulations. This collaboration not only enhances fraud detection and reduces compliance costs but also accelerates innovation in financial crime prevention, illustrating the transformative potential of Confidential Computing in the financial sector.

Go deeper with practical next steps

The report offers detailed insights into how Confidential Computing can enable secure multiparty data collaboration, which is crucial for industries like healthcare and financial services that deal with highly sensitive data. By understanding these mechanisms, organizations can better protect their data while leveraging collaborative opportunities. It provides actionable recommendations for improving data security practices, including the implementation of trusted execution environments (TEEs) and secure enclaves. These practical steps can help organizations enhance their overall cybersecurity posture and ensure compliance with global data protection regulations. The report includes industry-specific use cases that demonstrate the tangible benefits of Confidential Computing in various sectors. Readers can learn how leading organizations are successfully using this technology to innovate, improve operational efficiency, and gain a competitive edge while maintaining stringent security standards.

Take it from the experts

The primary research for “The Case for Confidential Computing” involved comprehensive interviews with key industry experts from leading organizations such as TikTok, Google, Hushmesh, Intel, Decentriq, RedHat, and the Confidential Computing Consortium. Participants included Vini Jaiswal, Mingshen Sun, and Dayeol Lee from TikTok; Manu Fontaine from Hushmesh; Marcus Hartwig from Google; Malini Bhandaru, Mike Ferron-Jones, Mona Vij, and Paul O’Neill from Intel; Nikolas Molyndris and Andrew Knox from Decentriq; and Mike Bursell from the Confidential Computing Consortium. These experts provided insights into the practical applications, benefits, and challenges of Confidential Computing across various sectors, highlighting the technology’s potential to enhance data security, facilitate compliance, and drive innovation.

Revolutionizing Data Security with Confidential Computing

Confidential Computing offers transformative benefits across multiple sectors by providing a secure, hardware-based environment that protects data in use. This technology enables efficient marketing by enriching first-party data, supports the adoption of AI by safeguarding proprietary models, and enhances financial security through secure data pooling. It also fosters collaboration in healthcare, allowing for better patient outcomes and accelerated medical research This approach could revolutionize data security, making it an inherent feature of the infrastructure, thus automating and securing the entire digital ecosystem.

Learn more about these important concepts and how your business can benefit by diving in to The Case for Confidential Computing by Suzanne Ambiel.

June Newsletter

By Newsletter No Comments

In Today’s Issue:

  1. Executive Director June Recap
  2. NEW ANNOUNCEMENT!
  3. Securing the Software Supply Chain
  4. Community News
  5. OSS EU 2024, Confidential Computing Mini Summit

Executive Director June recap

It was great to meet so many of you at the Confidential Computing Summit in San Francisco – both at the CCC sponsored meet-up at a local speakeasy and at the conference itself. I would like in particular like to thank everyone who engaged with and supported the work we’re doing at the CCC – by coming to the booth, talking to us in person and, of course, attending and speaking sessions. As well as a great deal of discussion around use cases (with a particular focus on AI), many people were interested in getting involved in discussions around business models for remote attestation, one of several topics I brought up in my keynote session (regulator and standards engagement was another popular one).  If you’re interested in getting involved, please let me know!

Combined with a number of podcasts, webinars and panel discussions at various conferences, interest in and visibility of Confidential Computing really seems to be picking up. We’ve got a working group on repositioning the CCC’s messaging to ensure that we’re able to respond to industry and ecosystem interest: we’d love more involvement in this as well.

Exciting News for Start-ups!

The Confidential Computing Consortium (CCC) has launched a new membership tier tailored for start-ups, offering a complimentary first-year membership. This initiative aims to empower emerging companies by providing access to vital resources, collaborative opportunities, and industry insights. Eligible start-ups can connect with leaders, gain educational materials, and influence industry standards. This is a fantastic chance to be part of the future of secure computing. 

 To learn more and apply, visit the Confidential Computing Consortium blog.

Securing the Software Supply Chain

In the wake of SolarWinds and other high-profile supply chain attacks, Confidential Computing offers new ways to protect the integrity of the software we all rely on. 
Recently we heard from Chad Kimes of Github and Marcela Melara from Intel on securing the software supply chain. They shared their work on SLSA, in-toto, & CI/CD for secure, attestable builds. You can watch their tech talk here.

Community News

Meet us at Open Source Summit

Bringing EU Community Together

CCC is hosting the “Confidential Computing Mini Summit” at the Open Source Summit EU, Vienna Austria.

  • ⏰ Time: 13:30 – 17:00
  • 🎫 Mini Summit Registration Fee: $10
  • 💰 20% Discount Code for Main Summit: OSSEUCOLOSPK20
    (*Note: Registration for the main conference is required to attend the Mini Summit.)
  • Register Here

Have a topic you want to present at the Mini Summit? Submit CFP Here

COCONUT-SVSM Joins the Confidential Computing Consortium: Enhancing Security for SensitiveWorkloads

By Announcement, Blog No Comments

The Confidential Computing Consortium (CCC) welcomes a new project: The COCONUT
Secure VM Service Module (COCONUT-SVSM), which aims to be a game-changer for secure
service provision within confidential virtual machines (CVMs). This is a significant step forward
for the project.


Published by SUSE in March 2023 the project built an active developer community with major
industry players contributing, including AMD, Microsoft, IBM, Intel, Redhat and Google. By
joining the CCC the project gains enhanced visibility and even more collaboration opportunities
within the confidential computing community and is set for further community growth.

Building a Secure Foundation for Confidential VMs

COCONUT-SVSM was started by SUSE and is now hosted by the Linux Foundation (LF),
known for fostering open-source collaboration. This choice reflects the project’s commitment to
open development and community involvement. COCONUT-SVSM aims to become a platform
that delivers essential services to CVMs. These services, which can not be provided by the host
VMM in a secure way, include:

  • Virtual TPM emulation: This functionality provides a secure Trusted Platform Modulewithin the CVM, enabling functionalities like secure key generation and storage, but alsoenable full remote attestation of workloads.
  • UEFI variable store: This secure storage area safeguards critical configuration data forthe CVM and enables secure boot on some platforms.
  • Live migration for CVMs: This feature allows for seamless movement of running CVMsacross different physical hosts without compromising security.

The key advantage of COCONUT-SVSM lies in its secure execution environment. It operates
within the trust boundary of the CVM, but is still isolated from the actual operating system. This
isolation ensures that even if the underlying system gets compromised, the security of services
offered by COCONUT-SVSM remains intact

Benefits for Confidential Computing

This integration will enable users to enhance their confidential VM setups with features like:

  • Secure Remote Attestation: This allows for verifying the integrity and trustworthiness of the execution environment, a crucial requirement for running sensitive workloads and protecting data.
  • End-To-End Data Security: Users can guarantee that their data is always encrypted and never visible to any unauthorized party during storage, transmission, and processing.

Ultimately, these features empower users to fully protect their data even in untrusted
environments like the public cloud. This paves the way for secure cloud deployments and
confidential computing adoption across various industries.

Industry Leaders Support COCONUT-SVSM

COCONUT-SVSM is gaining traction within the tech industry, with key partners recognizing its
potential to advance confidential computing. Here’s what some industry leaders have to say
about COCONUT-SVSM:

AMD
“SUSE and AMD have a long history of collaborating on the development of the Linux
ecosystem and confidential computing technologies for AMD EPYC Processors” said
Frank Gorishek, corporate vice president, Software Development, AMD. “We are thrilled
to see COCONUT-SVSM join the CCC as an open source implementation of the AMD
SVSM specification for SEV-SNP. AMD is committed to open source technologies such
as COCONUT-SVSM as a catalyst for collaborative innovation on transformative
technologies such as confidential compute.”

Microsoft
“A secure environment like COCONUT-SVSM can play a valuable role in confidential
computing.” a spokesperson from Microsoft Hyper-V said. ”It can hold secrets and
provide virtualization services seamlessly to improve the usability of CVMs.”

Open Governance and Continued Growth

The COCONUT-SVSM project fosters open collaboration. SUSE’s Jörg Rödel, as the founding
developer, is the current lead maintainer. In the future, a broader project leadership will be
established by a Technical Steering Committee (TSC) consisting of at least 3 lead people to
ensure diverse perspectives guide the project’s direction.


The project community collaborates via its GitHub organization, a mailing list and in weekly
community meetings. There the project’s future, current challenges, and contributions from a
broad developer base are discussed.


Every developer passionate about confidential computing and secure service provisioning is
invited to start contributing to COCONUT-SVSM and support the continued growth of the
project.

The Meaning Behind the Name

The name COCONUT is a play on the term “CoCo,” a common abbreviation for confidential
computing. The “coconut” metaphor reflects the project’s focus on robust security, symbolizing a
hard-to-crack shell protecting the integrity of sensitive data.


By joining the Confidential Computing Consortium, COCONUT-SVSM is set to make significant
contributions to the field of confidential computing. The community excited to see the project
flourish within the CCC and invite all those interested in secure virtualization technology to join
the thriving COCONUT-SVSM project. Together, we can bring confidential computing and
end-to-end data protection forward for a wide range of industries and applications.

Exciting News: New Start-up Membership Tier from the Confidential Computing Consortium

By Blog No Comments

The Confidential Computing Consortium (CCC) is thrilled to announce the launch of a new membership tier tailored specifically for start-ups.  This initiative is designed to empower emerging companies by offering them a unique opportunity to join the CCC community free of charge for the first 12 months. Here’s everything you need to know about this fantastic new offer.

Why This Matters

Confidential Computing is transforming data protection and processing. By using hardware-based techniques to isolate sensitive data, it ensures security even during processing. As the field evolves, collaboration and innovation are essential to keep up with advancements. The CCC plays a pivotal role by uniting industry leaders, researchers, and innovators to drive the future of secure computing.

What is the CCC?

The Confidential Computing Consortium (CCC) unites hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. As a project community within the Linux Foundation, the CCC is dedicated to defining and promoting Confidential Computing through open governance and collaboration. This initiative includes commitments from numerous member organizations and contributions from several open-source projects, following the successful model of other ambitious efforts.

Introducing the Start-up Membership Tier

We understand the unique challenges that start-ups face, from limited resources to the need for rapid innovation. To support these dynamic enterprises, the CCC has introduced a Start-up Membership Tier, providing eligible start-ups with complimentary membership for their first year. This new tier aims to foster innovation and collaboration among the next generation of leaders in Confidential Computing.

Benefits of Joining

By becoming a CCC member, start-ups gain access to a wealth of resources, including:

  • Collaborative Opportunities: Connect with leading companies, researchers, and developers in the field of Confidential Computing.
  • Educational Resources: Access cutting-edge research, training materials, and industry insights to stay ahead of the curve.
  • Networking: Participate in exclusive events, workshops, and forums to share ideas and explore potential partnerships.
  • Influence and Visibility: Contribute to the direction of Confidential Computing standards and gain visibility within the industry.

Eligibility Criteria

To qualify for this exciting new membership tier, start-ups must meet the following criteria:

  • Current Member of the Linux Foundation: Your organization must already be a part of the Linux Foundation community.
  • Employee Count: Your organization must have fewer than 100 employees.

How to Apply

Applying for the Start-up Membership Tier is simple! If your start-up meets the eligibility criteria, you can submit your application through the CCC website. Once approved, your start-up will enjoy a full year of membership benefits without any fees.

Join Us in Shaping the Future

This is a remarkable opportunity for start-ups to engage with the forefront of Confidential Computing technology. We invite all eligible start-ups to take advantage of this offer and join us in shaping the future of secure, private computing.

For more details and to apply, visit the Confidential Computing Consortium website.

Let’s innovate, collaborate, and shape the future of Confidential Computing together


Stay connected with the CCC community by following us on X, LinkedIn, and GitHub.

Unlocking AI for the Enterprise: Confidential Computing Summit

By Blog, CCC Events No Comments

Author: Raluca Ada Popa

With the rapid rise of generative AI and LLMs, we’re on the cusp of one of the largest technology super cycles in history; the global AI market size was already valued at $196B in 2023. However, C-suite execs and IT professionals alike cite data privacy concerns as the #1 obstacle to AI adoption for their organizations.

This is the year for confidential computing innovators and researchers, users and makers to come together, crack the code and unlock AI for the enterprise. The Confidential Computing Consortium, together with Opaque Systems, is co-hosting the Confidential Computing Summit this June with exactly that goal in mind: to expose and accelerate organizational initiatives around confidential data and AI.

Think of the Summit as our Consortium’s mission made manifest. A mega collaboration of the world’s top minds in confidential data, trustworthy AI and privacy-preserving generative AI unfolding over two days of learning and networking.

We anticipate hundreds of decision-makers and thought leaders in sectors such as financial services, insurance, telco, manufacturing, and healthcare. We have over 30 use cases lined up, selected from over 86 submissions, as well as dynamic discussions and visionary keynotes that include:

  • Mike Bursell, Executive Director, Confidential Computing Consortium
  • Raluca Ada Popa, Co-founder and President of Opaque, Associate Professor CS at UC Berkeley, and Chair of the Confidential Computing Summit
  • Anand Pashupathy, VP & GM, Security Software and Services Division, Product Assurance and Security, Intel
  • Karthik Narain, Group Chief Executive – Technology, Accenture
  • Mark Russinovich, Chief Technology Officer, Microsoft Azure
  • Nelly Porter, Director of Product Management, Google
  • Jason Clinton, Chief Information Security Officer, Anthropic
  • Sello Nevo, Director of the Meselson Center, RAND Corporation

And we’ll be delving deep into confidential computing and sensitive data – from national security to genomic epidemiology, noteworthy trends to critical best practices. You’ll learn about: 

  • Confidential Computing
  • Confidential Analytics
  • Confidential AI
  • Privacy-preserving Generative AI and LLM’s
  • Privacy Enhancing Technologies
  • Data Privacy and Compliance
  • Secure Enclaves
  • Confidential Computing Cloud Environments
  • Confidential VM’s

With two full days to roll up our sleeves, open our collars and truly dig into the opportunities and challenges, we’re excited to see where the Summit will take us and what new possibilities will emerge. Check out the full agenda here.

In case you missed it, we’re offering a discount to all of our Confidential Computing Consortium members. Register here and get 50% off with our special promo code CCC50.

April Newsletter

By Newsletter No Comments

Welcome to the 2024 CCC Newsletter- your guide to awesome happenings in our CCC community.

In Today’s Issue:

  1. Welcome New Members from the Confidential Computing Consortium
  2. New SIG to Bridging the Gap Between Linux Kernel and Confidential Computing Developers
  3. Meet us at RSAC
  4. Outreach Engagement

From the Executive Director

The conference season is well and truly upon us and I’m pleased to be speaking at a number of them during the next few months.  It’s also great to see more sessions on Confidential Computing being accepted by program committees: if you or a colleague is presenting at a conference session, please let the Outreach committee know so that we can spread the word via the newsletter, social media and beyond.

NVIDIA Premier Membership

I’m also very glad to be able to welcome NVIDIA as a Premier Member.  They have been with the CCC for a while, but have recently moved up to Premier, with Michael O’Connor serving as their GB representative.  In fact, we’re beginning to see an uptick in engagement by members across the committees, SIGs and beyond: this can only help the goals of the CCC as we make the most of the opportunities that are arising as the ecosystem realizes the benefits that Confidential Computing can bring.

I hope to see you at one of the conferences we’re attending: please let us know if you’re going to be at any of them – details available on the website under Events.

Read about NVIDIA and our upcoming Events.

I

Screenshot 2024-04-22 164949

FROM The TAC

Announcing Our New SIG: Bridging the Gap Between Linux Kernel and Confidential Computing Developers

We’re thrilled to unite two groups within the same company who haven’t always been in communication: Linux Kernel developers and Confidential Computing developers. While some individuals may straddle both roles, often they represent distinct disciplines.

Read about the SIG and upcoming meetings.

RSAC 2024_1600x900_GEN 9

Bringing Confidential Computing to RSAC 2024

Membership Has Its Benefits. Get an Extra $150 off RSAC 2024.

Join us May 6 – 9 at RSAC 2024, the ultimate cybersecurity destination. Immerse yourself in expert-led sessions, connect with industry leaders, and discover the latest trends and best practices. Elevate your cybersecurity game and be a part of shaping the industry’s future. Don’t miss this opportunity to advance your skills and network with the best in the field. 

CCC members save an additional $150 when registering with code 14UCCCFD. Register now. 

Visit us at Booth #2161 (South Expo)

CCC $150 Discount Code: 14UCCCFD

CCC FREE Expo Pass Code: 52ECONCOMPXO 

VIEW FULL AGENDA

Outreach Engagement

CCC at Industry Conferences

New Blog Series to Add to Your Favorite

CCSummiit CCC Kit Twitter (1)-1
Register for CC Summit

May Newsletter

By Newsletter No Comments

Welcome to the 2024 May Newsletter

In Today’s Issue:

  1. RSAC Recap
  2. New CCC Working Groups
  3. Tech Talk on Attestation
  4. CCC Blogs + Upcoming Events
  5. CC Summit: Conference for Confidential Data & AI

Hello Community Member,

CCC New Working Groups

As you know, industry-leading organizations come together at CCC and are constantly working to develop and collaborate on standards for Confidential Computing.

On this topic, we’re forming a working group to look at repositioning the CCC and how we present ourselves to the outside world (not to mention potential members), including reflecting on the importance of AI, data privacy, and collaborative computation.

Another working group is considering whether the Consortium should offer a certification for companies, products, services, or solutions.  We’re looking for involvement in both of these working groups, so if you have strong views on either, please get in touch.

Tech Talk on Attestation

Attestation lets us evaluate whether we can trust an enclave or a Confidential Virtual Machine (CVM). CVMs have more moving parts to evaluate than enclaves.

This month we had a great Tech Talk from Googler, Dionna Glaze. She explained a lot of the detail required to provide transparency and trust in some of these layers like the virtual firmware (UEFI). 

Watch this talk on YouTube and find the slides in our TAC Governance repository.

New Blogs This Month

CCC at Industry Conferences

Coming up next, here are our upcoming event activities.

ccc50

BIGGEST Discount Ever Exclusively for CCC Community

We’re pumped to have so many expert speakers coming together for #CCSummit in just a few weeks. Save BIG with the CCC discount code and invite your network to join us.

CCC member HH (1280 x 720 px)-1
Happy Hour for All (& Aspiring) Members!
Coming to CC Summit? Join us for an evening of an unforgettable speakeasy experience and good conversation. Mark your calendar, RSVP below, and we can’t wait to see you!
⏰ June 4th, Tuesday | 6PM
📍 Bourbon & Branch San Francisco
🎫 RSVP Here
If you find this newsletter helpful, forward this to your network!
Subscribe to CCC Newsletter

Unlocking AI for the Enterprise: Confidential Computing Summit

By Blog, Event No Comments

With the rapid rise of generative AI and LLMs, we’re on the cusp of one of the largest technology super cycles in history; the global AI market size was already valued at $196B in 2023. However, C-suite execs and IT professionals alike cite data privacy concerns as the #1 obstacle to AI adoption for their organizations.

This is the year for confidential computing innovators and researchers, users and makers to come together, crack the code and unlock AI for the enterprise. The Confidential Computing Consortium, together with Opaque Systems, is co-hosting the Confidential Computing Summit this June with exactly that goal in mind: to expose and accelerate organizational initiatives around confidential data and AI.

Think of the Summit as our Consortium’s mission made manifest. A mega collaboration of the world’s top minds in confidential data, trustworthy AI and privacy-preserving generative AI unfolding over two days of learning and networking.

We anticipate hundreds of decision-makers and thought leaders in sectors such as financial services, insurance, telco, manufacturing, and healthcare. We have over 30 use cases lined up, selected from over 86 submissions, as well as dynamic discussions and visionary keynotes that include:

  • Mike Bursell, Executive Director, Confidential Computing Consortium
  • Raluca Ada Popa, Co-founder and President of Opaque, Associate Professor CS at UC Berkeley, and Chair of the Confidential Computing Summit
  • Anand Pashupathy, VP & GM, Security Software and Services Division, Product Assurance and Security, Intel
  • Karthik Narain, Group Chief Executive – Technology, Accenture
  • Mark Russinovich, Chief Technology Officer, Microsoft Azure
  • Nelly Porter, Director of Product Management, Google
  • Jason Clinton, Chief Information Security Officer, Anthropic
  • Sello Nevo, Director of the Meselson Center, RAND Corporation

And we’ll be delving deep into confidential computing and sensitive data – from national security to genomic epidemiology, noteworthy trends to critical best practices. You’ll learn about: 

  • Confidential Computing
  • Confidential Analytics
  • Confidential AI
  • Privacy-preserving Generative AI and LLM’s
  • Privacy Enhancing Technologies
  • Data Privacy and Compliance
  • Secure Enclaves
  • Confidential Computing Cloud Environments
  • Confidential VM’s

With two full days to roll up our sleeves, open our collars and truly dig into the opportunities and challenges, we’re excited to see where the Summit will take us and what new possibilities will emerge. Check out the full agenda here.

In case you missed it, we’re offering a discount to all of our Confidential Computing Consortium members. Register here and get 15% off with our special promo code CCC15!

Decoding Trust in Confidential Computing: Foundations and Open Source Perspectives

By Blog No Comments

At this month’s Open Source Software Summit NA, Mike Bursell, Executive Director of the Confidential Computing Consortium, presented at the session “Decoding Trust in Confidential Computing” with Sal Kimmich, Technical Community Architect, also with the CCC. The session explored trust in computing, merging confidential computing and open-source principles. 

Mike and Sal discussed frameworks for trust in Confidential Computing  environments, including technological protocols, human factors, and trust in open source. Case studies revealed hardware-level attestation in confidential computing and the philosophical dimensions of open source. Join us for a deep dive into computing trust, where technical, communal, and policy aspects converge. 

Read more below for greater insights.

Confidential Computing Definition

Confidential computing safeguards data in use by conducting computations within hardware-based Trusted Execution Environments (TEEs). It is defined as “the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment.”

Introduction to Trust in Confidential Computing

Trust in Confidential Computing hinges on components such as the software supply chain, key management, cloud computing, software correctness, AI provenance, identity, authorization/authentication, data privacy, hardware supply chain, and cryptographic primitives. The fundamental question arises: Whom do we trust, and for what purposes?

Workloads and Host

In the standard virtualization model, VMs and containers handle Type 1 and Type 2 workloads well, while Type 3 poses challenges that VMs and containers cannot adequately address. Trusted Execution Environments (TEEs) become crucial for Type 3 isolation, particularly for cloud-native workloads involving sensitive data and applications. Hardware-based TEEs offer Type 3 isolation as well as Types 1 and 2.

Trust in Open Source

The Open-Source Software (OSS) community endorses trust, with its roots in software primitives and derivable properties. This endorsement isn’t confined to monolithic authorities but is embodied within communities. Exposing this endorsement through commercial implementations/distributions, open-source foundations, and decentralized organizations is essential.

Pillars of Trust in Confidential Computing

Trust in Confidential Computing rests on several pillars: Tools of Trust (trust anchors) encompassing hardware, firmware, and software; Derivable properties including integrity, confidentiality, identity, and uniqueness; and Primitives such as hardware-based TEEs. Endorsers, including silicon, firmware, software, and the open-source community, play a vital role in building trust. They are not solely monolithic authorities but can represent the collective authority of a community.

The Role of the Confidential Computing Consortium

The Confidential Computing Consortium plays a pivotal role in instilling confidence among businesses, regulators, and standards bodies through the technical maturity of the open-source community. Examples of applications include Microsoft’s migration of credit card processing to Confidential Computing, the University of Freiburg’s adoption of collaborative research platforms, combating human trafficking and modern slavery, AI inference for data and model protection, remote attestation models, standardized ABIs, and database protection models.

Confidential Computing is not merely a potential open-source technology but a necessary one. Its foundation in open-source principles is indispensable for fostering trust and security in the digital landscape.

The Confidential Computing Consortium is a community focused on projects securing data in use and accelerating the adoption of confidential computing through open collaboration and bringing together hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards.

Learn how you and your organization can get involved .