AMI TruE® Featured as an Edge Compute Platform Security Solution in the Intel® Smart Edge Ecosystem

Dec 28, 2021

System and platform providers have long understood that to drive and accelerate the adoption of their products it is also essential to provide a well-developed ecosystem of applications and development tools for their enterprise, cloud and data center customers. Doing so enables end users to optimize and fine-tune the performance of their systems for specific applications without reinventing the wheel and spending valuable time and resources on application testing and development.

As a leading provider of open-source and enterprise foundational technologies, AMI has always been committed to participation in a broad range of these programs, recognizing the multitude of benefits they offer in helping to drive innovation forward. In this spirit, we are pleased to share that our AMI TruE® Trusted Environment Security Solution is now featured as an Edge Compute Platform Security Solution within the Intel® Smart Edge Ecosystem.

AMI is proud to be featured together with Advantech®, Dell EMC®, Lenovo®, Red Hat®, Supermicro® and many other industry leaders who are driving innovation at the edge of the network with commercialized solutions optimized with Intel Smart Edge. AMI has optimized AMI TruE for Intel® architecture-based hardware according to the guidelines of the Intel Smart Edge program, to ensure that data center and edge systems remain secure and protected throughout the product lifecycle.

About the Intel Smart Edge Program

The Intel Smart Edge Program (previously known as OpenNESS) is a leading example of a successful and quickly-growing ecosystem initiative for enabling end-user success. This program represents a comprehensive portfolio of edge computing software that is highly optimized for Intel-based hardware platforms, making it easy for enterprises to onboard and manage applications and network functions across on-premise and the network edge.

The Intel Smart Edge portfolio of solutions supports workload convergence at the edge for networking and IoT workloads by enabling adopters with highly optimized platforms for service acceleration at the edge. It delivers the advanced capabilities required at the edge for AI, media, security, networking and similar industries and consists of two main offerings, both with advanced capabilities and optimizations for easy adoption into edge products and platforms. Intel Smart Edge, which includes AMI TruE, is a comprehensive selection of turn-key commercial software delivered with differentiated features and services directly from Intel, while Intel® Smart Edge Open is a royalty-free edge software toolkit available for developers and infrastructure builders.

AMI TruE: A Powerful Solution for Confidential Computing, Platform Attestation and Trusted Cloud Execution

As edge and data center platforms continue to add firmware for individual components, firmware vulnerability has also grown as an area of concern – driving interest in its security and integrity to new heights. Because innovation in firmware security demands a deep understanding of firmware and its development, AMI is perfectly positioned to enhance firmware security for the industry and deliver trust at the platform level. And as a longstanding partner of Intel, AMI and Intel continue to closely collaborate in the delivery of leading-edge firmware and security technologies – making AMI TruE a perfect fit for the Intel Smart Edge program.

AMI TruE is a holistic data center and edge security solution that delivers foundational security, leveraging security technologies from Intel including Intel® Security Libraries for Data Centers (Intel® SecL-DC) and Intel® Software Guard Extensions (Intel® SGX). It is scalable, extensible and built for cloud-to-edge applications, tracking the trusted compute status of servers and edge platforms and providing remediation measures for untrusted platforms.

Leveraging Intel SGX, AMI TruE enables confidential computing, eases deployment of workload attestation, provides reliable workload launch time protection, secures encrypted application keys and more. It delivers reliable remediation with in-band provisioning for untrusted platforms through Redfish®-based provisioning features and out-of-band management with DMTF Redfish® standards for resource discovery and management, continuous monitoring and remediation actions.

AMI TruE for Intel Smart Edge Deployment Model

AMI TruE supports a scalable and distributed deployment model, where the Intel® Smart Edge Open Controller Node hosts the control plane components and the platform security service is hosted on the worker node. The platform security agent runs on each edge node managed by AMI TruE.

A key use case supported by AMI TruE for Intel Smart Edge hardware is launch time protection. Because the security status of edge infrastructure hardware, firmware and software is not typically tracked by infrastructure providers, edge infrastructure administrators are often less aware of whether the hosts on which they are launching their workloads are verified, compromised, or susceptible to outside attacks. To address this shortcoming, cloud orchestrators like Kubernetes® can label server nodes with key value attributes.

In this way, AMI TruE remote attestation services can publish trust and informational attributes to the orchestrator for use in workload launching decisions – such as only launching sensitive workloads on trusted edge servers. Now, administrators can utilize AMI TruE edge infrastructure to schedule their application workloads with orchestrator policies, to ensure they land on trusted hardware. And with custom asset tag labeling, administrators can launch every workload on the host that is categorized to meet the specific requirements of each.

Get Started with the Intel Smart Edge Ecosystem Today

To get started with Intel Smart Edge commercial and open-source solutions, please visit https://networkbuilders.intel.com/intel-technologies/intel-smart-edge.

To access AMI TruE in the Intel® Smart Builder Commercial Solutions library, please visit

https://networkbuilders.intel.com/commercial-applications/ami-true-platform-attestation

And for more information on the AMI TruE Platform Security Solution, visit ami.com/run-secure or contact AMI via ami.com/contact to connect with an AMI Security Solutions Expert.

Redfish® is a registered trademark of DMTF in the US and other countries. KUBERNETES® is a registered trademark of the Linux Foundation in the US and other countries. Advantech® is a registered trademark of ADVANTECH CO., LTD. limited company (ltd.) TAIWAN in the US and other countries. Dell EMC® is a registered trademark of Dell Inc. in the US and other countries. Lenovo® is a registered trademark of Lenovo (Beijing) Limited CORPORATION CHINA in the US and other countries. Red Hat® is a registered trademark of Red Hat, Inc. in the US and other countries. Supermicro® is a registered trademark of Super Micro Computer, Inc. in the US and other countries.

Trusted for What’s Critical

AMI is your low-risk partner for high-stakes innovation. Our firmware solutions drive performance, reliability and time to market when it matters most.

When you work with AMI, you get deep expertise, proven stability and hands-on support throughout your development journey. Contact us to learn how AMI firmware solutions can help you reduce risk, simplify complexity and scale with confidence.

DOWNLOAD LICENSE AGREEMENT

NOTICE SPECIFIC TO SOFTWARE AVAILABLE ON THIS WEBSITE (ami.com) OR ANY OTHER AMI OWNED, OPERATED, LICENSED OR CONTROLLED SITE

 Any software that is made available to download from this server ("Software") is the copyrighted work of AMI and/or its suppliers. Use of the Software is governed by the terms of the end user license agreement, if any, which accompanies or is included with the Software ("License Agreement"). An end user will be unable to install any Software that is accompanied by or includes a License Agreement, unless he or she first agrees to the License Agreement terms.

 The Software is made available for downloading solely for use by end users according to the License Agreement. Any reproduction or redistribution of the Software not in accordance with the License Agreement is expressly prohibited by law and may result in severe civil and criminal penalties. Violators will be prosecuted to the maximum extent possible.

 WITHOUT LIMITING THE FOREGOING, COPYING OR REPRODUCTION OF THE SOFTWARE TO ANY OTHER SERVER OR LOCATION FOR FURTHER REPRODUCTION OR REDISTRIBUTION IS EXPRESSLY PROHIBITED, UNLESS SUCH REPRODUCTION OR REDISTRIBUTION IS EXPRESSLY PERMITTED BY THE LICENSE AGREEMENT ACCOMPANYING SUCH SOFTWARE.

 THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE LICENSE AGREEMENT. EXCEPT AS WARRANTED IN THE LICENSE AGREEMENT, AMI HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.

 FOR YOUR CONVENIENCE, AMI MAY MAKE AVAILABLE ON THIS SERVICE OR IN ITS SOFTWARE PRODUCTS, TOOLS AND UTILITIES FOR USE AND/OR DOWNLOAD. AMI DOES NOT MAKE ANY ASSURANCES WITH REGARD TO THE ACCURACY OF THE RESULTS OR OUTPUT THAT DERIVES FROM SUCH USE OF ANY SUCH TOOLS AND UTILITIES. PLEASE RESPECT THE INTELLECTUAL PROPERTY RIGHTS OF OTHERS WHEN USING THE TOOLS AND UTILITIES MADE AVAILABLE ON THIS SERVICE OR IN AMI SOFTWARE PRODUCTS.

 RESTRICTED RIGHTS LEGEND. Any Software which is downloaded from this Server (ami.com) any other AMI owned, operated, licensed or controlled site for or on behalf of the United States of America, its agencies and/or instrumentalities ("U.S. Government"), is provided with Restricted Rights. Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software - Restricted Rights at 48 CFR 52.227-19, as applicable. Manufacturer is AMI 3095 Satellite Boulevard, Building 800, Suite 425, Duluth, GA 30096.

NOTICE SPECIFIC TO DOCUMENTS AVAILABLE ON THIS WEBSITE

 Permission to use Documents (such as white papers, press releases, datasheets and FAQs) from this server (ami.com) any other AMI owned, operated, licensed or controlled site ("Server") is granted, provided that (1) the below copyright notice appears in all copies and that both the copyright notice and this permission notice appear, (2) use of such Documents from this Server is for informational and non-commercial or personal use only and will not be copied or posted on any network computer or broadcast in any media and (3) no modifications of any Documents are made. Educational institutions ( specifically K-12, universities and state community colleges) may download and reproduce the Documents for distribution in the classroom. Distribution outside the classroom requires express written permission. Use for any other purpose is expressly prohibited by law and may result in severe civil and criminal penalties. Violators will be prosecuted to the maximum extent possible.

 Documents specified above do not include the design or layout of the ami.com website or any other AMI owned, operated, licensed or controlled site. Elements of AMI websites are protected by trade dress, trademark, unfair competition and other laws and may not be copied or imitated in whole or in part. No logo, graphic, sound or image from any AMI website may be copied or retransmitted unless expressly permitted by AMI.

 AMI AND/OR ITS RESPECTIVE SUPPLIERS MAKE NO REPRESENTATIONS ABOUT THE SUITABILITY OF THE INFORMATION CONTAINED IN THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED ON THIS SERVER FOR ANY PURPOSE. ALL SUCH DOCUMENTS AND RELATED GRAPHICS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. AMI AND/OR ITS RESPECTIVE SUPPLIERS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS INFORMATION, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL AMI AND/OR ITS RESPECTIVE SUPPLIERS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF INFORMATION AVAILABLE FROM THIS SERVER.

 THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED ON THIS SERVER COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN. AMI AND/OR ITS RESPECTIVE SUPPLIERS MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED HEREIN AT ANY TIME.

NOTICES AND PROCEDURE FOR MAKING CLAIMS OF COPYRIGHT INFRINGEMENT

 Pursuant to Title 17, United States Code, Section 512(c)(2), notifications of claimed copyright infringement should be sent to Service Provider's Designated Agent. ALL INQUIRIES NOT RELEVANT TO THE FOLLOWING PROCEDURE WILL NOT RECEIVE A RESPONSE.

 See Notice and Procedure for Making Claims of Copyright Infringement.

LINKS TO THIRD PARTY SITES

 THE LINKS IN THIS AREA WILL LET YOU LEAVE AMI'S SITE. THE LINKED SITES ARE NOT UNDER THE CONTROL OF AMI AND AMI IS NOT RESPONSIBLE FOR THE CONTENTS OF ANY LINKED SITE OR ANY LINK CONTAINED IN A LINKED SITE, OR ANY CHANGES OR UPDATES TO SUCH SITES. AMI IS NOT RESPONSIBLE FOR WEBCASTING OR ANY OTHER FORM OF TRANSMISSION RECEIVED FROM ANY LINKED SITE. AMI IS PROVIDING THESE LINKS TO YOU ONLY AS A CONVENIENCE, AND THE INCLUSION OF ANY LINK DOES NOT IMPLY ENDORSEMENT BY AMI OF THE SITE.

UNSOLICITED IDEA SUBMISSION POLICY

 Neither AMI, nor its employees, agents and/or subsidiaries, shall accept or consider unsolicited ideas, including but not limited to ideas for new advertising campaigns, new promotions, new products or technologies, processes, materials, marketing plans or new product names. Submission of any original creative artwork, samples, demos, or other works to AMI is expressly prohibited. In the event a submission including unsolicited materials of any nature is received by AMI, said submission shall be destroyed and AMI shall not be liable for any direct or consequential damages suffered by the sender, nor shall AMI be under any obligation to treat such material as confidential or proprietary. It is expressly understood that the rationale for AMI's policy on unsolicited idea submission is to prevent a third party from making a claim of infringement against AMI on the basis of an idea, product, or other material that is developed by AMI, that may be similar to or the same as an idea, product, or other material contained in an unsolicited submission that may have been submitted to and/or received by AMI.

FEEDBACK AND INFORMATION

 ANY FEEDBACK YOU PROVIDE AT THIS SITE SHALL BE DEEMED TO BE NON-CONFIDENTIAL. AMI IS FREE TO USE SUCH INFORMATION ON AN UNRESTRICTED BASIS.

Terms & Conditions