{"id":564,"date":"2024-12-21T09:01:12","date_gmt":"2024-12-21T09:01:12","guid":{"rendered":"https:\/\/v918.thegioicongnghe.org\/?p=564"},"modified":"2024-12-21T09:01:12","modified_gmt":"2024-12-21T09:01:12","slug":"elevating-cloud-security-microsoft-azure-boosts-confidential-computing","status":"publish","type":"post","link":"https:\/\/vv918.thegioicongnghe.org\/?p=564","title":{"rendered":"Elevating Cloud Security: Microsoft Azure Boosts Confidential Computing"},"content":{"rendered":"<p>In the ever-evolving landscape of cloud computing,\u00a0<b>Microsoft Azure<\/b>\u00a0takes a significant leap forward by bolstering its hardware-backed confidential computing. This enhancement encompasses safeguarded environments for\u00a0Virtual Machines (VMs), containers, and\u00a0<b>Graphics Processing Units (GPUs)<\/b>, eliminating the necessity for intricate specialized code.<\/p>\n<p>The prevalent challenge faced by enterprises in the public cloud realm is the inherent publicity. While applications run in isolated virtual machines and data resides in dedicated virtual storage, the risk of data exposure persists, especially in multitenant environments. Concerns about data security and regulatory compliance often lead businesses to retain sensitive data on-premises, forfeiting the scalability and global accessibility offered by the cloud.<\/p>\n<p>Economically, maintaining on-premises data incurs challenges, including expensive egress charges for cloud-hosted data and the need for robust security organizations. Addressing these concerns,\u00a0<b>confidential computing emerges as a viable middle ground<\/b>, leveraging modern silicon advancements.<\/p>\n<h2><span id=\"Advancements_in_Confidential_Computing\" class=\"ez-toc-section\"><\/span>Advancements in Confidential Computing:<\/h2>\n<p>Microsoft\u2019s journey into confidential computing began with the utilization of Intel\u2019s secure extensions to processor instruction sets, forming the foundation for Azure\u2019s confidential computing. Over the years, the market has witnessed significant progress, transcending from working with encrypted memory chunks to encrypting the entire working memory of VMs and hosted services. Notably, the scope now extends to a diverse array of silicon hardware, including support from<b>\u00a0AMD and Arm<\/b>.<\/p>\n<p>A groundbreaking development is Nvidia\u2019s integration of confidential computing features into GPUs. This facilitates the construction of machine learning models using confidential data while ensuring the protection of data used in mathematical modeling. With GPUs operating at scale, the cloud transforms into a supercomputer, and the addition of confidential computing capabilities to GPUs enables efficient partitioning and sharing of compute capabilities.<\/p>\n<h2><span id=\"Simplifying_Confidential_Computing_on_Azure\" class=\"ez-toc-section\"><\/span>Simplifying Confidential Computing on Azure:<\/h2>\n<p>Microsoft Azure\u2019s commitment to advancing confidential computing aligns with hardware evolution. The platform initially focused on providing protected, encrypted memory for data. Recent updates, announced at Ignite 2023, expand the protection to entire environments for VMs, containers, and GPUs. A noteworthy aspect is the elimination of the need for specialized code; code and data can now be encapsulated in secure, isolated, and encrypted spaces.<\/p>\n<p>This approach facilitates the usage of the same applications on both regulated and unregulated data by targeting the appropriate VM hosts. Additionally, confidential VMs and containers offer the ability to seamlessly migrate on-premises applications to the cloud while ensuring regulatory compliance.<\/p>\n<h2><span id=\"Azure_Confidential_VMs_with_Intel_TDX\" class=\"ez-toc-section\"><\/span>Azure Confidential VMs with Intel TDX:<\/h2>\n<p>The newly introduced Azure confidential VMs, leveraging the latest Xeon processors and\u00a0<b>Intel\u2019s Trust Domain Extensions (TDX)<\/b>, provide robust support for attestation techniques ensuring VM integrity. Key management flexibility allows users to manage their keys or leverage the underlying platform. With OS support for Windows Server and Linux, these VMs cater to hefty workloads, especially those demanding substantial memory.<\/p>\n<p>Microsoft has initiated the preview rollout of these new confidential VMs, starting in one European and two US Azure regions, with an additional European region scheduled for early 2024.<\/p>\n<h2><span id=\"Azure_Confidential_VMs_with_GPU_Support\" class=\"ez-toc-section\"><\/span>Azure Confidential VMs with GPU Support:<\/h2>\n<p>A notable evolution is the addition of GPU support to confidential VMs, significantly expanding available compute capabilities. Based on Nvidia H100 GPUs, commonly employed in training various AI models, these confidential VMs enable the use of private information as a training set, exemplified in scenarios like product evaluation model training on prototype components or working with medical data for diagnostic tool training.<\/p>\n<p>Rather than embedding a GPU in a VM and encrypting the entire VM, Azure maintains a separation, utilizing encrypted messaging to link the encrypted GPU with the confidential computing instance. Both operate within their trusted execution environments (TEE), ensuring data security. This concept aligns with using an external GPU over Thunderbolt or another PCI bus.<\/p>\n<h2><span id=\"Confidential_Containers_on_Kubernetes\" class=\"ez-toc-section\"><\/span>Confidential Containers on Kubernetes:<\/h2>\n<p>Expanding the realm of confidential computing, Microsoft\u2019s managed Kubernetes service, Azure Kubernetes Service (AKS), introduces support for confidential containers. Unlike full VMs, these containers operate within host servers, built on AMD\u2019s hardware-based confidential computing extensions. AKS\u2019s confidential containers, an implementation of the open-source Kata containers, leverage utility VMs (UVMs) to host secure pods.<\/p>\n<p>These confidential containers, running within UVMs, enable the same AKS host to support both secure and insecure containers, accessing hardware support through the underlying Azure hypervisor. Similar to confidential VMs, these containers accommodate existing workloads, including bringing in existing Linux containers.<\/p>\n<div class=\"google-auto-placed ap_container\"><\/div>\n<p>In conclusion, the latest strides in Azure\u2019s confidential computing capabilities pave the way for overcoming barriers to migrating regulated workloads to the cloud. This introduces a new on-ramp to deliver scalable and burst use of secure computing environments. While additional configuration and management steps are imperative around key management and attestation, these align with standard practices for handling sensitive information both on-premises and in the cloud.<\/p>\n<h2><span id=\"Confidential_Computing_as_a_Security_Imperative\" class=\"ez-toc-section\"><\/span>Confidential Computing as a Security Imperative:<\/h2>\n<p>The integration of these features into Azure positions confidential computing as an essential component when dealing with sensitive and regulated information. By fortifying the cloud with these capabilities and ensuring support in the underlying silicon, Microsoft makes the cloud an increasingly attractive option, particularly for industries in health and finance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving landscape of cloud computing,\u00a0Microsoft Azure\u00a0takes a significant leap forward by bolstering its hardware-backed confidential computing. This enhancement encompasses safeguarded environments for\u00a0Virtual Machines (VMs), containers, and\u00a0Graphics Processing Units (GPUs), eliminating the necessity for intricate specialized code. The prevalent&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-564","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=564"}],"version-history":[{"count":1,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/564\/revisions"}],"predecessor-version":[{"id":565,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/564\/revisions\/565"}],"wp:attachment":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}