Adopting Zero Trust architecture

Security & Risk (S&R) professionals are adopting Zero Trust architecture by erasing the current trusted and untrusted network model; instead, they are identifying sensitive data, actors, and their workflows and designing micro-perimeters around them[1]. This means that data and data protection form the foundation for today’s security architecture, where workloads merge the gap between clouds—public and private—and on-premise infrastructure.

However, data protection remains incomplete without in-use protection. S&R professionals are looking for solutions that not only protect data-in-use but also at the velocity of Cloud.

IBM Cloud Data Shield

Data Shield, powered by Fortanix, provides data-in-use protection for your container workloads running on the IBM Cloud Kubernetes Service. It leverages Intel® Software Guard Extensions (SGX) technology to run code and data in CPU-hardened “enclaves” or a Trusted Execution Environment (TEE). The enclave is a trusted area of memory where critical aspects of the application functionality are protected, helping keep code and data confidential and unmodified.

Data Shield provides DevOps tools that integrate with your existing build pipelines to convert your container images to Intel® SGX counterparts with little to no code changes. It runs on the IBM Cloud Kubernetes Service to bring scalability and high availability to your sensitive workloads.

Provisioning

Data Shield is offered as a helm chart on IBM Cloud. You can download and install Data Shield to your Intel SGX® enabled IBM Cloud Kubernetes Service cluster. Please find the Data Shield helm chart documentation here.

Data Shield Enclave Manager

Data Shield Enclave Manager provides Kubernetes worker-node-level security attributes. It uses IBM Cloud App ID, backed by cloud directory, for user authentication. It populates all the Intel® SGX-enabled worker nodes and the applications running on them. It streamlines Intel Attestation by embedding attestation reports in a downloadable X.509 certificate.

Data Shield Enclave Manager

Worker nodes on the IBM Cloud Kubernetes Service and their attestation information

Downloadable X.509 certificate with embedded Intel attestation report

We are very pleased to collaborate with IBM—utilizing IBM’s Data Shield to protect Blockchain-based DApps executing in iExec decentralized cloud. IBM Data Shield delivers secure provisioning of secrets for Dapps, ensuring the data and application execution remain completely protected,” said Gilles Fedak, CEO of iExec.

Data Shield Converter Service          

Data Shield Converter service helps convert Docker container images to Intel® SGX counterparts. As a security measure, it runs locally to your cluster. You can invoke it through a container running in the same cluster:

curl -k -H ‘Content-Type: application/json’ -d ‘ {“inputImageName”: “your-registry-server/your-app”, “outputImageName”: “your-registry-server/your-app-sgx”}’ https://datashield-enclaveos-converter.default.svc.cluster.local/v1/convert-image

Converter service pulls your container image, converts it, and pushes it back to your container registry without any further input or code changes in your application. At launch, it supports applications written in Python, C, and C++.

To get started with converter service, you can use an example three-tier e-wallet application hosted here.

Out-of-the-box Intel® SGX applications

At initial delivery, Data Shield offers pre-converted Intel SGX® container images for VaultMySQLNginx, and Barbican. You can find the container images and their “getting started” documentation on the IBM Cloud public registry.

IBM Cloud container registry

Call to action

To request a demo, receive a Slack invite for Data Shield workspace, or ask any questions, please email shield1@us.ibm.com.

References:

Categories

More from compute

Mainframe Application Modernization Beyond Banking

4 min read - Looking at mainframe modernization in industries like insurance, automotive and retail. This is part one in a five-part series on mainframe modernization. When you think of the world’s biggest modernization challenges, you immediately think of banking, and for good reason. Banks were among the first to roll out advanced mobile apps some 15 years ago, and they had already started offering online services in the mid-1990s. Well before that, banks were interacting through massive electronic payment gateways and operating mainframe…

IBM Tech Now: April 17, 2023

< 1 min read - Envizi + Turbonomic, IBM Power Updates and the IBM CIS Standard Next Plan  Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 74 Watch the video This week, we're focusing on the following topics: IBM Envizi + IBM Turbonomic IBM Power Updates IBM…

Focusing on Increasing Our Clients’ Profitability and Performance When They Need It Most

4 min read - Exciting updates from IBM Power. As we noted last quarter when we announced this year’s strategic direction for IBM Power, one of the most common questions we hear from our clients is how they can trim their IT spending without compromising performance and data protection. A short time later, these concerns are even more prevalent as the global economic market continues to fluctuate and perpetuate uncertainty amidst rising interest rates and inflation. As the demand on IT services continues to…

Securing the Boot Process for IBM Cloud Bare Metal Servers for VPC

4 min read - IBM Cloud Bare Metal Servers for VPC have been available for almost a year, and we continue the steady rollout of additional features to ensure bare metal servers meet our customers’ requirements. The latest IBM Cloud Bare Metal Servers for VPC features are focused squarely on security by providing customers with the ability to enable Secure Boot and to use a Trusted Platform Module (TPM 2.0). Secure Boot and TPM are software- and hardware-based mechanisms used to validate and enforce…