Powering Next Generation Privacy Controls with Platform Attestation

With the frequency of serious and costly data breaches increasing, how can a company be sure that its data remains confidential – especially if that data is extremely sensitive? Among the highly regulated industries that have the most concerns and continue to face costly data breaches are the healthcare, financial, manufacturing and education sectors. Since the average cost of a data breach in these industries ranges from roughly $4M to $7M, it is not surprising that these same sectors are keenly interested in data privacy and new approaches such as confidential computing to avoid data breaches in cloud and on-premises data centers.

Establishing a Trusted Environment

Confidential computing is an emerging industry initiative aimed at preserving privacy and confidentiality and ensuring compliance with government regulations. Established in October 2019, the Confidential Computing Consortium (CCC) consists of hardware vendors, cloud providers and software developers who are experts at addressing data security in its three states: in transit, at rest and in use. Data moving in the network (in transit), data in various forms of storage (at rest) and data being processed (in use) all need the highest level of protection with hardware-based trust; this is especially true for data in use.

To underscore the need for protecting data privacy and confidentiality, market research firm Gartner predicts that by 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases.

Regulatory Compliance Driving New Approaches to Data Privacy

Regional governments around the world continue to enact new data privacy regulations that create various constraints and liabilities for organizations. For example, Europe’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA)  may make data custodians directly responsible when the data of users, customers, or clients is leaked due to a breach. With the potential cost of a data breach under the GDPR reaching as high as 4% of gross annual revenue, data custodians are strongly incentivized to protect potential surface areas against attack, including data-in-use.

In the United States, the Executive Order on Improving the Nation’s Cybersecurity dated May 12, 2021 calls for substantial improvements in the federal government’s cloud-based, on-premises, or hybrid computing systems, highlighting the need for increased data security at the national level.

As part of its Risk Management Framework (RMF), the draft NIST SP 800-53A Rev. 5 “Assessing Security and Privacy Controls in Information Systems and Organizations” published August 2021 provides a control assessment methodology to help identify security and privacy strengths and weaknesses within systems.

As such, an enterprise or cloud service provider with data centers in different parts of the world running different workloads can encounter different issues, requirements or obstacles in their efforts to comply with the variety of regional regulations.

Intel® Software Guard Extension (SGX) Technology       

Improved firmware security and security at the platform level are required to address the sharp increase in cybersecurity threats and government regulations. To help protect data while it is actively used in memory, Intel® Software Guard Extensions (Intel® SGX) provides application isolation technology. In addition, Intel® Security Libraries for Data Centers (Intel® SecL – DC) was built to aid customers in adopting and deploying Intel security features, such as the Secure Key Caching Use Case. 3rd Gen Intel® Xeon® Scalable Processors from Intel® feature these key security technologies to help provide assurance that the data center and all server hardware residing there is secure.

Enabling Confidential Computing

AMI TruE® platform attestation enables confidential computing that isolates sensitive data in an encrypted CPU enclave during processing. It leverages these same Intel® SGX and Intel® SecL-DC technologies found in 3rd Gen Intel® Xeon® Scalable Processors from Intel® to provide a true trusted environment for confidential computing and secure cloud execution through assured integrity of all platform firmware.

AMI TruE uses RESTful APIs to integrate into other data center management environments. Supply chain attacks can be easily avoided by attesting the shipped firmware and software hash information with the attestation server upon installation into an existing trusted environment. After deployment, server trust validation continues to attest the integrity of the firmware and software running throughout the data center.

The AMI TruE platform attestation solution is a great addition for cloud service providers looking to augment their cloud-native security and for organizations running sensitive workloads on-premises.

Use Case Examples

Organizations running sensitive workloads, particularly in highly regulated industries, know that they must stay on top of constantly evolving threat vectors to protect critical business data and preserve confidentiality. Here are some examples of how they can employ confidential computing to stay in step with regulations and drive new efficiencies:

Multi-party Collaboration in Healthcare

Although healthcare companies need to collaborate for enhanced diagnostics, they are generally reluctant to share patient data with each other on machine-learning projects aimed at discovering new medical treatments. Using confidential computing, they can collaborate with their own data sets to train a machine-learning model without exposing sensitive information.

 Edge and IoT Security for 5G Communications

Much of today’s sensitive data is processed at the edge and needs to be protected there. Edge computing is a distributed computing paradigm that brings computation and data storage closer to data sources such as IoT devices and local edge servers to improve response times and save bandwidth. When this framework is used with the cloud, confidential computing can help protect against data breaches during data processing at edge nodes.

Data security and privacy enforcement will be stringent as we see wider adoption of 5G. Data collection and processing will explode at 5G edge data centers, where they will process highly sensitive PII data compared to traditional data centers. Because the potential for damage due to a security breach in 5G is enormous, data security and privacy is a fundamental requirement for the continued adoption and success of 5G.

 It’s a Matter of Trust     

Most cloud services providers and organizations do not have their own specially developed trust mechanisms and custom solutions for attestation. Yet they still need to establish a trusted environment that leverages a standards-based approach to run and protect their sensitive workloads. Confidential computing enabled by AMI TruE platform attestation is a reliable solution to establish trust – so privacy is preserved, confidentiality is ensured and the various regulatory requirements are met.

To learn more:

Visit ami.com/true and schedule a consultation today at ami.com/contact

Intel, the Intel logo and Xeon are trademarks of Intel Corporation or its subsidiaries.

Trusted for What’s Critical

AMI is your low-risk partner for high-stakes innovation. Our firmware solutions drive performance, reliability and time to market when it matters most.

When you work with AMI, you get deep expertise, proven stability and hands-on support throughout your development journey. Contact us to learn how AMI firmware solutions can help you reduce risk, simplify complexity and scale with confidence.

DOWNLOAD LICENSE AGREEMENT

NOTICE SPECIFIC TO SOFTWARE AVAILABLE ON THIS WEBSITE (ami.com) OR ANY OTHER AMI OWNED, OPERATED, LICENSED OR CONTROLLED SITE

 Any software that is made available to download from this server ("Software") is the copyrighted work of AMI and/or its suppliers. Use of the Software is governed by the terms of the end user license agreement, if any, which accompanies or is included with the Software ("License Agreement"). An end user will be unable to install any Software that is accompanied by or includes a License Agreement, unless he or she first agrees to the License Agreement terms.

 The Software is made available for downloading solely for use by end users according to the License Agreement. Any reproduction or redistribution of the Software not in accordance with the License Agreement is expressly prohibited by law and may result in severe civil and criminal penalties. Violators will be prosecuted to the maximum extent possible.

 WITHOUT LIMITING THE FOREGOING, COPYING OR REPRODUCTION OF THE SOFTWARE TO ANY OTHER SERVER OR LOCATION FOR FURTHER REPRODUCTION OR REDISTRIBUTION IS EXPRESSLY PROHIBITED, UNLESS SUCH REPRODUCTION OR REDISTRIBUTION IS EXPRESSLY PERMITTED BY THE LICENSE AGREEMENT ACCOMPANYING SUCH SOFTWARE.

 THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE LICENSE AGREEMENT. EXCEPT AS WARRANTED IN THE LICENSE AGREEMENT, AMI HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.

 FOR YOUR CONVENIENCE, AMI MAY MAKE AVAILABLE ON THIS SERVICE OR IN ITS SOFTWARE PRODUCTS, TOOLS AND UTILITIES FOR USE AND/OR DOWNLOAD. AMI DOES NOT MAKE ANY ASSURANCES WITH REGARD TO THE ACCURACY OF THE RESULTS OR OUTPUT THAT DERIVES FROM SUCH USE OF ANY SUCH TOOLS AND UTILITIES. PLEASE RESPECT THE INTELLECTUAL PROPERTY RIGHTS OF OTHERS WHEN USING THE TOOLS AND UTILITIES MADE AVAILABLE ON THIS SERVICE OR IN AMI SOFTWARE PRODUCTS.

 RESTRICTED RIGHTS LEGEND. Any Software which is downloaded from this Server (ami.com) any other AMI owned, operated, licensed or controlled site for or on behalf of the United States of America, its agencies and/or instrumentalities ("U.S. Government"), is provided with Restricted Rights. Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software - Restricted Rights at 48 CFR 52.227-19, as applicable. Manufacturer is AMI 3095 Satellite Boulevard, Building 800, Suite 425, Duluth, GA 30096.

NOTICE SPECIFIC TO DOCUMENTS AVAILABLE ON THIS WEBSITE

 Permission to use Documents (such as white papers, press releases, datasheets and FAQs) from this server (ami.com) any other AMI owned, operated, licensed or controlled site ("Server") is granted, provided that (1) the below copyright notice appears in all copies and that both the copyright notice and this permission notice appear, (2) use of such Documents from this Server is for informational and non-commercial or personal use only and will not be copied or posted on any network computer or broadcast in any media and (3) no modifications of any Documents are made. Educational institutions ( specifically K-12, universities and state community colleges) may download and reproduce the Documents for distribution in the classroom. Distribution outside the classroom requires express written permission. Use for any other purpose is expressly prohibited by law and may result in severe civil and criminal penalties. Violators will be prosecuted to the maximum extent possible.

 Documents specified above do not include the design or layout of the ami.com website or any other AMI owned, operated, licensed or controlled site. Elements of AMI websites are protected by trade dress, trademark, unfair competition and other laws and may not be copied or imitated in whole or in part. No logo, graphic, sound or image from any AMI website may be copied or retransmitted unless expressly permitted by AMI.

 AMI AND/OR ITS RESPECTIVE SUPPLIERS MAKE NO REPRESENTATIONS ABOUT THE SUITABILITY OF THE INFORMATION CONTAINED IN THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED ON THIS SERVER FOR ANY PURPOSE. ALL SUCH DOCUMENTS AND RELATED GRAPHICS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. AMI AND/OR ITS RESPECTIVE SUPPLIERS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS INFORMATION, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL AMI AND/OR ITS RESPECTIVE SUPPLIERS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF INFORMATION AVAILABLE FROM THIS SERVER.

 THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED ON THIS SERVER COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN. AMI AND/OR ITS RESPECTIVE SUPPLIERS MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED HEREIN AT ANY TIME.

NOTICES AND PROCEDURE FOR MAKING CLAIMS OF COPYRIGHT INFRINGEMENT

 Pursuant to Title 17, United States Code, Section 512(c)(2), notifications of claimed copyright infringement should be sent to Service Provider's Designated Agent. ALL INQUIRIES NOT RELEVANT TO THE FOLLOWING PROCEDURE WILL NOT RECEIVE A RESPONSE.

 See Notice and Procedure for Making Claims of Copyright Infringement.

LINKS TO THIRD PARTY SITES

 THE LINKS IN THIS AREA WILL LET YOU LEAVE AMI'S SITE. THE LINKED SITES ARE NOT UNDER THE CONTROL OF AMI AND AMI IS NOT RESPONSIBLE FOR THE CONTENTS OF ANY LINKED SITE OR ANY LINK CONTAINED IN A LINKED SITE, OR ANY CHANGES OR UPDATES TO SUCH SITES. AMI IS NOT RESPONSIBLE FOR WEBCASTING OR ANY OTHER FORM OF TRANSMISSION RECEIVED FROM ANY LINKED SITE. AMI IS PROVIDING THESE LINKS TO YOU ONLY AS A CONVENIENCE, AND THE INCLUSION OF ANY LINK DOES NOT IMPLY ENDORSEMENT BY AMI OF THE SITE.

UNSOLICITED IDEA SUBMISSION POLICY

 Neither AMI, nor its employees, agents and/or subsidiaries, shall accept or consider unsolicited ideas, including but not limited to ideas for new advertising campaigns, new promotions, new products or technologies, processes, materials, marketing plans or new product names. Submission of any original creative artwork, samples, demos, or other works to AMI is expressly prohibited. In the event a submission including unsolicited materials of any nature is received by AMI, said submission shall be destroyed and AMI shall not be liable for any direct or consequential damages suffered by the sender, nor shall AMI be under any obligation to treat such material as confidential or proprietary. It is expressly understood that the rationale for AMI's policy on unsolicited idea submission is to prevent a third party from making a claim of infringement against AMI on the basis of an idea, product, or other material that is developed by AMI, that may be similar to or the same as an idea, product, or other material contained in an unsolicited submission that may have been submitted to and/or received by AMI.

FEEDBACK AND INFORMATION

 ANY FEEDBACK YOU PROVIDE AT THIS SITE SHALL BE DEEMED TO BE NON-CONFIDENTIAL. AMI IS FREE TO USE SUCH INFORMATION ON AN UNRESTRICTED BASIS.

Terms & Conditions