Skip to content
@enclaive

enclaive

Building confidential computing technology to shield workload in the cloud, leveraging Intel SGX/TDX, AMD SEV, and ARM-CCA.

Welcome to enclaive - Home of Confidential Compute 👋

enclaive.io

TL;TR

  • 👂 We are enclaive, pronounced /ˈɛnkleɪv/
  • 🔭 We build easy-to-use tools to deploy open-source applications anywhere with the extra power that applications are memory encrypted at any moment in time during execution and can prove the confidential state to a third party
  • 💯 Why use confidential apps?
    • You care about data and application security and privacy, respectively
    • You distrust the hosting/cloud provider
  • 🤓 What are use cases?
    • You have built some super cool application, but your users insist to host the application on-premise, and you fear giving away the code ("intellectual property protection")
    • You have built another super cool application, you host the application in the cloud, and you and/or your users fear disclosing personal data ("data privacy", "data sovereignty")
    • You have built yet another super application, you host the application and fear the security costs ("security expenses reduction")
  • 🕺 We combine Intel Security Guard Extension/Trusted Domain Extension and open-source libOS technology to turn standard containers into confidential containers
  • ❤️ We love open-source software and want that many more users to benefit from enclaved applications
  • 🤝 We aim to help open-source projects to close the last mile 💯
  • 📫 How to reach us: Best way is via discord
  • ⚡ Fun fact: the 'i' in enclaive stands for inimitable pointing to the fact that whatever runs in confidential containers can't be copied

Organization

enclaive-logo
enclaive.io

Home of Confidential Compute

Demo Videos · Web Site · Twitter · Youtube

Community Page
Write for us · Introduction Articles · Tutorials

In a nutshell

Motivation
Let's be frank. Open-source software is awesome! So many projects have been created in the last decades that shaped the entire software industry. Even enterprises have realized the value and importance of open-source software. Instead of reinventing the wheel and writing proprietary software from scratch, enterprises deploy open-source software to build business applications. The enterprise-wide acceptance of open-source software has helped many community projects to establish a sustainable business model around, paving the ground to make a living out of a passionate idea.

Open-source projects employ a variety of business models to solve the challenge of how to make money by providing software that is by definition licensed free of charge. Each of these business strategies rests on the premise that users of open-source technologies are willing to purchase additional software features under proprietary licenses or purchase other services or elements of value that complement the open-source software that is core to the business. This additional value can be, but is not limited to, enterprise-grade features and up-time guarantees (often via a service-level agreement) to satisfy business or compliance requirements, performance and efficiency gains by features not yet available in the open source version, legal protection (e.g., indemnification from copyright or patent infringement), or professional support/training/consulting that are typical of proprietary software applications.

In recent years we see a growing interest in managed services. Enterprises use the software without the burden of being in charge of the hosting infrastructure and its availability, as well as the updatability and security of the software. Although enterprises have numerous benefits from managed offerings, they are hesitant! The key reason is the lack of control. Granting a third party permission to manage software applications, raises a lot of trust, security, privacy, and compliance issues that do not go along with enterprise policies. In some cases, in which IT resources are scarce, managed services are desperately desired, however, they are ruled out strictly due to the named reasons. Software companies are thus left with the provisioning of first, second, and third-level support and are taken the ability to scale.

Mission
Our mission is to make open-source software deployable everywhere by everyone. By everyone, we mean any individual, any business or any industry. By everywhere we mean any execution platform, be it private or be it public. We envision the further democratization of open-source software. The notion of free choice behind open-source software extends to free deployment. No one should be stopped from using open-source software anywhere.

Confidential Containers Technology explained
TL;TR
Confidential Containers execute programs with the addition that
  • at any moment in time throughout the execution the process runs in encrypted memory
  • the authenticity of the confidential execution is verifiable
They are compatible with Docker, Docker Swarm, and Kubernetes.

A Primer: How does it work?

Hardware-graded Security

Confidential Containers leverage Intel's Security Guard Extension (SGX) technology, enriching the processor architecture with special registers for key storage and cryptographic algorithms as well as a memory management unit with the ability to allocate physical memory for encrypted processes, called enclaves. It is important to note solely the CPU has the capability to decrypt processes running in encrypted memory; key material is generated at random during boot and inaccessible through software.

Threat Model

Exactly the hardware-graded isolation fortifies program executions in untrusted environments. By design, Confidential Containers protect enclaved processes against malicious/corrupted
  • nested applications
  • hypervisor
  • kernel
  • bootloader
caused by attacks leading to container escalation including buffer overflow, return-oriented programing, specter, meltdown, row hammer, and various forms of rootkits.

Local and Remote Attestation

In untrusted execution environments memory encryption is insufficient. Malicious environments may replace the container before execution. To this end, confidential containers have a unique cryptographic identity. During the container build process, the author signs the application. With the corresponding key material, one can verify the authenticity of the confidential container. Local attestation is a supported cryptographic protocol to locally verify the container's authenticity. Here, the CPU takes the role of a trusted auditor. It measures the fingerprint of the enclaved application. Remote attestation goes one step further and allows a client to verify the authenticity. The protocol resembles the concept of local attestation and generates a cryptographic report (kinda an X.509 certificate). The aim is to prove to a remote party that the platform has executed the right container. Thus, the ideal use case for remote attestation is the assurance of proper container execution in public clouds.

Key Management and Key Provisioning

Confidential containers load like off-the-shelf containers a program into the memory before execution. While remote attestation safeguards authenticity and integrity, the approach does not prevent the untrusted environment from scrutinizing the container including the file system. For example, a Web server container is typically packaged with the server's SSL/TLS certificate and secret key. In light of untrusted environments, this approach is vulnerable and requires additional measures. A rule of thumb is to avoid including any secrets to the confidential container. As argued before, the untrusted environment may reverse engineer the secret from the container image. The solution chosen for confidential containers is to load the application into the encrypted memory without secrets. Before running the program a pre-main process loads from a key management server the secrets through a secure channel protocol, stores them in the enclave, and continues with the main execution. A bit more concrete, the key management server first remotely attests it talks to the right container and that the container is within encrypted memory before establishing a TLS connection into the enclave to transport the secrets. The protocol is referred to as secret key provisioning and aims to mutually authenticate the key provider and container before sending the secret.

Platform Prerequisites
Confidential Containers require
  • SGX2 enabled CPUs (Intel skylake and newer)
  • installed drivers (streamlined in Linux kernel 5.11+)
  • docker, docker-compose, Kubernetes or compatible container platform

Contribution
enclaive solicits any contribution that brings confidential containers to the application. Get in touch with us via email (contact@enclaive.io), Twitter (enclaive_io), or Discord.

Getting Started
We suggest you look into the wiki (tbd) to familiarize yourself with the underlying technology and get the first containers packaged by enclaive running.

Our confidential compute management and orchestration platform ("PortainerCC")

portainerCC
Portainer
Confidential Compute Edition

Our confidential apps ("The Base")

arangodb-sgx
ArangoDB-SGX
mysql-sgx
MariaDB-SGX
mongodb-sgx
MongoDB-SGX
redis-sgx
Redis-SGX
nodejs-sgx
Nodejs-SGX
python-sgx
Python-SGX
rust-sgx
Rust-SGX
go-sgx
Go-SGX
php-sgx
PHP-SGX
ruby-sgx
Ruby-SGX
java-sgx
Java-SGX
c-sgx
C-SGX
cplusplus-sgx
Cpp-SGX
csharp-sgx
Csharp-SGX
mosquitto-sgx
Mosquitto-SGX
nginx-sgx
Nginx-SGX
wordpress-sgx
Wordpress-SGX
umami-sgx
Umami-SGX
hashicorp-vault-sgx
Always encrypted
Hashicorp Vault

Videos on Youtube

Get Started with Confidential Compute


104s introduction to confidential compute

How CTOs/CISOs become superheros

Confidential Apps in Action


Dumping the Redis Memory while in Use (read more)

MariaDB Data-in-Use encryption of SQL queries (read more)

MongoDB Data-in-Use encyption of password insertion (read more)

ArangoDB Data-in-Use Encryption (read more)

NodeJS Express and Protection against Runtime Leakage (read more)

Attempt to modify protected Volume/Files (read more)

Write a file into shared encrypted Volume (read more)

HTTPS server prevents the access to X.509 certificate private key (read more)

Wordpress anonymizes the IP-to-geolocation lookup (read more)

... for more examples check also out the demo branch of other repos

Tutorials, Conference Talks, ...


FOSDEM'23 Tutorial: Build confidential cloud applications with THE BASE

ASG23 Talk: Confidential Compute - State of the Art and how to get started

PortcainerCC Tutorial: build, deploy, attest, and provision MariaDB in Azure Confidential Cloud

For AMA, join Discord

We believe in community efforts. If you want to stop by for some java, get to know us, get pointers to how get started, seek support or help with your own project, you find us on ...

Discord Banner 4

Pinned Loading

  1. enclaive-docker-mongodb-sgx enclaive-docker-mongodb-sgx Public

    SGX-ready Enclaive Docker Image for MongoDB

    Dockerfile 3

  2. enclaive-docker-nodejs-sgx enclaive-docker-nodejs-sgx Public

    SGX-ready Enclaive Docker Image for Node

    Dockerfile 6 1

  3. enclaive-docker-mariadb-sgx enclaive-docker-mariadb-sgx Public

    SGX-ready Enclaive Docker Image for MariaDB

    Dockerfile 7

  4. enclaive-docker-nginx-sgx enclaive-docker-nginx-sgx Public

    SGX-ready Enclaive Docker Image for Nginx

    C 31 1

  5. enclaive-docker-redis-sgx enclaive-docker-redis-sgx Public

    SGX-ready Enclaive Docker Image for Redis

    Shell 3

  6. portainerCC portainerCC Public

    Making confidential compute docker, docker swarm and kubernetes management simple

    Go 9 2

Repositories

Showing 10 of 42 repositories
  • enclaive-helm-opendesk Public

    Enclaive's helm for confidential Opendesk

    enclaive/enclaive-helm-opendesk’s past year of commit activity
    0 0 0 0 Updated Dec 11, 2024
  • enclaive-vault-ra-sgx-plugin Public

    Hashicorp Vault Plugin to support Intel SGX attestation

    enclaive/enclaive-vault-ra-sgx-plugin’s past year of commit activity
    Go 0 0 0 0 Updated Oct 9, 2024
  • papers Public

    enclaive publications around confidential computing

    enclaive/papers’s past year of commit activity
    TeX 0 0 0 0 Updated Jul 6, 2024
  • buckypaper-openssh Public Forked from open-quantum-safe/openssh

    OpenSSH that includes quantum-resistant key exchange and authentication in SSH

    enclaive/buckypaper-openssh’s past year of commit activity
    C 0 1,889 0 0 Updated May 27, 2024
  • .github Public

    enclaive's public organization profile

    enclaive/.github’s past year of commit activity
    1 1 0 0 Updated Mar 14, 2024
  • enclaive-docker-hashicorp-vault-sgx Public

    In-memory encrypted Hashicorp Key Vault with Intel SGXv2 enclave technology and attestation plugin

    enclaive/enclaive-docker-hashicorp-vault-sgx’s past year of commit activity
    Dockerfile 13 5 2 1 Updated Feb 20, 2024
  • snp-edk2 Public Forked from tianocore/edk2

    EDK II

    enclaive/snp-edk2’s past year of commit activity
    C 0 2,595 0 0 Updated Oct 26, 2023
  • edk2 Public Forked from tianocore/edk2

    EDK II

    enclaive/edk2’s past year of commit activity
    C 0 2,595 0 0 Updated Oct 26, 2023
  • snp-qemu Public Forked from AMDESE/qemu

    QEMU fork

    enclaive/snp-qemu’s past year of commit activity
    C 0 30 0 0 Updated Oct 16, 2023
  • qemu Public Forked from AMDESE/qemu

    QEMU fork

    enclaive/qemu’s past year of commit activity
    C 0 30 0 0 Updated Oct 16, 2023

Top languages

Loading…

Most used topics

Loading…