← Back to Main Page

Confidential Computing Concepts

Confidential computing refers to technologies and practices that isolate and protect data during processing, preventing unauthorized access—even by the owner of the hardware or a cloud service provider (CSP). This is primarily achieved using trusted execution environments (TEEs) and associated security mechanisms such as attestation, secure boot, and robust key management.

Goals

Confidentiality

Integrity

Availability

Concepts

Trusted Execution Environment (TEE)

A TEE is a secure and isolated environment within a computer system where sensitive data and code can be processed in a protected and confidential manner.

Secure Enclave

A secure enclave is a hardware-based implementation of a TEE. It typically:

Trusted Computing Base (TCB)

The TCB is the collection of hardware, software, and firmware components essential for enforcing a system’s security policies. When we talk about a “trusted” computing base, we don’t necessarily mean that the system is secure, but that these components are critical for the system’s security. They are the root of trust, because the system assumes they are secure enough to be trusted. We must, after all, start trusting somewhere. This is actually what defines a TCB and why it must be as minimal as possible.

Attestation

Attestation is the process of verifying the integrity and authenticity of a TEE or secure enclave before performing sensitive operations.

Confidential Virtual Machines (CVMs)

What is a Confidential Virtual Machine (CVM)?
A CVM is a virtual machine that uses hardware-level memory encryption to protect its runtime data (memory).

How is this achieved?

Why is it significant?

TCB and Remote Attestation in CVMs

Practical Benefits of CVMs

CIA Triad in TEEs (Refresher)

Confidential Computing in Kubernetes

  1. Option 1: “Wrap the whole cluster”
    • Run the control plane and worker nodes inside confidential VMs so that the cloud provider (and other tenants) cannot access your cluster data.
    • Straightforward if you trust all cluster components and just want to shield them from the outside world.
  2. Option 2: Per-Node or Per-Workload TEE
    • Harder if you need to protect a single worker node from an untrusted admin in the same cluster.
    • The kubelet generally has broad control over pods, which can undermine TEE guarantees.
    • True multi-tenant “untrusted admin” approaches require more careful design (e.g., ephemeral micro-VMs for each pod).

Multi-tenant vs. Single-tenant Security

Storing Secrets & etcd

Confidential Containers (COCO)

Performance Overhead

Remote Attestation & Supply Chain

Confidential Virtual Machines (CVMs) and TEEs

Trusted Platform Modules (TPMs) vs. Hardware Security Modules (HSMs)

Containers vs. CVMs

Offerings in Confidential Computing

Capability Level

SDKs

Platform Offerings

Packaged CC Offerings

Packaged Non-CC Offerings

Ideal requirements for a Trustworthy TCB

A cornerstone of Confidential Computing (CC) is having a well-defined trust model, which mandates a fully traceable and attestable TCB. The challenge: many CC vendors provide large and complex TCBs, making it difficult or impossible to verify each component.

Example Problem: UEFI/BIOS

Many cloud services provide UEFI/BIOS components for virtual machines, but these often are proprietary, unavailable for external audit, or otherwise excluded from the CC attestation chain. Moreover, “lift-and-shift” approaches—migrating entire VM images without modification—can bloat the TCB, muddying the chain of trust.

Possible Solutions

Availability of First- or Third-Party Attestation

Even if the TCB itself is trustworthy, it must be attested (verified) by a party other than the system operator or cloud provider. Generally, there are two models:

  1. First-Party Attestation
    • The workload owner runs an attestation server, verifying their own TEEs.
    • Keeps the CSP or hardware operator out of the trust chain.
  2. Third-Party Attestation
    • A neutral, trusted entity performs the attestation.
    • Minimizes the risk of conflicts of interest and ensures an unbiased security assessment.

Potential Conflict: Relying on the CSP’s own attestation service can introduce a conflict of interest. Unless there is a legally separate business unit with its own governance, a single CSP acting as both the platform operator and the attestation authority can undermine the independence required for truly confidential workloads. Consequently, many enterprises prefer to use truly independent attestation—either run by themselves (first-party) or by a trusted, external third-party.

Additional Overview of Confidential Computing

What is Confidential Computing?

Confidential Computing protects data in use by performing computation inside a hardware-based, attested trusted execution environment (TEE) or similar construct.

The key innovation is reducing the number of trusted parties or components. By moving security guarantees into the lowest layers of hardware (with minimal dependencies), you remove operating system vendors, driver vendors, platform providers, and service-provider admins from your circle of trust. This drastically lowers risk of compromise if any of those layers are breached.


Attestation Models (Analogy)

What is attestation?


Enclave Properties Recap

  1. Isolation
    Enclaves act independently from the rest of the system. No other component—even the OS or hypervisor—can access enclave memory.

  2. Runtime Memory Encryption
    Anything processed or stored inside the enclave is always encrypted in memory.

  3. Sealing
    An enclave can securely store data on untrusted storage by encrypting and binding it to the enclave’s identity.

  4. Remote Attestation
    An enclave can prove to a remote party that it’s running on genuine secure hardware, and that its code/configuration have not been tampered with.


Use Cases


Another View on Remote Attestation

Think of a secure enclave as a super-secure black box. You provide the code and data to this black box, and it processes them while preventing any outside party from peeking in.