Skip to content

Files

Latest commit

513f8ba · Dec 21, 2021

History

History
32 lines (23 loc) · 2 KB

attestation.md

File metadata and controls

32 lines (23 loc) · 2 KB
title description services author ms.service ms.subservice ms.workload ms.topic ms.date ms.author ms.custom
Attestation for SGX enclaves
You can use attestation to verify that your Azure confidential computing SGX enclave is secure.
virtual-machines
stempesta
virtual-machines
confidential-computing
infrastructure
conceptual
12/20/2021
stempesta
ignite-fall-2021

Attestation for SGX Enclaves

Azure confidential computing offers Intel SGX-based virtual machines (VMs) for isolating a portion of your code or data. When you build with SGX enclaves, you can verify and validate that your trusted environment is secure. This verification is the process of attestation.

Overview

With attestation, a relying party can have increased confidence that their software runs in an enclave, is up-to-date, and is secure.

For example, an enclave can ask the underlying hardware to generate a credential. This credential includes proof that the enclave exists on the platform. A second enclave can receive and verify that the same platform generated the report.

:::image type="content" source="./media/attestation/attestation.png" alt-text="Diagram of attestation process, showing client's secure exchange with enclave that holds the data and application code.":::

Implement attestation with a secure attestation service that is compatible with the system software and silicon. Two options are Microsoft Azure Attestation, and Intel's attestation and provisioning services.Both services are compatible with Intel SGX DCsv2-series VMs in Azure confidential computing. However, DCsv3-series and DCdsv3-series VMs aren't compatible with Intel attestation service.

Next step

[!div class="nextstepaction"] Microsoft Azure Attestation samples for enclave aware apps