⚙️
Morphisms: Confidential Serverless Containers
  • Introduction
  • Preliminaries
    • What is Confidential Computing?
      • Threat Model
      • Intel SGX
        • Threat Model
        • Memory Layout
        • Memory encryption
        • Enclave Lifecycle
        • Entering and Exiting an Enclave
        • Measurement
        • Certificate
        • Key Derivation
        • Attestation
        • Gramine
        • SGX2
        • Secret Key Provisioning
      • AMD SEV-SNP
        • Encrypted CPU Registers
        • Memory encryption
        • Secure Nested Paging
        • Virtual Machine Privilege Levels (VMPL's)
        • Cryptographic Keys
        • Secret Key Provisioning
        • Guest Deployment
    • Serverless (FaaS)
      • Knative
  • Confidential Serverless Containers
    • Introduction
    • Intel SGX
      • Threat Model
      • Remote attestation verification
      • Secure Storage
        • HashiCorp's Vault
      • Architecture
        • Confidential Knative
        • Certificates
        • Session Management
      • Confidential Container Configuration
    • AMD SEV-SNP
      • Threat Model
      • Architecture
        • Network communication
        • KMS
        • Updates
        • Key rotation
      • Design Decision
  • Benchmarks
    • Hardware
    • Results
    • Architecture Comparison
  • Getting Started
    • FAQ
    • Intel SGX
    • AMD SEV-SNP
  • Glossary
    • SGX Glossary
    • AMD SEV-SNP Glossary
Powered by GitBook
On this page

Glossary

Key Management Service (KMS)

is a centralized secrets storage enforcing access policies and data-at-rest encryption

Virtual Machine (VM)

is a virtualized machine through software and hardware. It has dedicated resources and allows a singly system to run multiple virtualized systems.

Attestation Verification Service (AVS)

is a service hosted on another cloud provider, which is able to verify remote attestation reports

Trusted Execution Environment (TEE)

are used to isolate applications from an untrusted software stack. Isolation is usually enforced by hardware

Hardware Security Module (HSM)

are hardware device's especially designed to secure and manage secrets and perform cryptographic operations. Especially, it has protection against many side-channel attacks.

Message Authentication Code (MAC)

are tags that can be used to check the integrity of a message. In addition, it also entices authentication.

Certificate Authority (CA)

is a trusted entity issuing certificates. For organizations to be able to have a recognized CA, they have to go through a rigorous examination process.

Certificate Signing Request (CSR)

is a standard request format for requesting certificates from a CA and contains identifying information and the public key that later is signed in the certificate.

Trusted Computing Base (TCB)

is hardware, software and firmware that is trusted to enforce security

Denial of Service (DoS)

is an attack against the availablity of a system or network. It makes the component inaccessible.

System-on-chip (SoC)

stores multiple computer architectural components on a single chip

PreviousAMD SEV-SNPNextSGX Glossary

Last updated 1 year ago