ABSTRACT
SPIRE is an open-source project that enables the provisioning of verifiable identities to software components based on an attestation of the software properties, avoiding the leakage risks of pre-provisioned secrets. This paper presents an implementation of a SPIRE plugin that enables the attestation of AMD SEV-SNP confidential virtual machines. Our approach leverages the pluggable architecture from SPIRE and depends only on minor changes to QEMU, changes taken from its open-source community, and that should soon be merged. As a result, application providers can now use SPIRE to restrict sensitive credentials to be available only to services in environments protected from malicious hosts and cloud operators using AMD SEV-SNP technology. Our experiments show that the steps needed to create and attest the confidential VM do not prohibitively increase boot times (from 10.8 to 20.9 seconds) and that confidential VMs with encrypted disks only slightly degrade the CPU and RAM performance (about ) of unmodified applications.
- AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. Technical Report.Google Scholar
- AMD. 2022. SEV Secure Nested Paging Firmware ABI Specification. Technical Report.Google Scholar
- AMD. 2023. AMD SEV-TIO: Trusted I/O for Secure Encrypted Virtualization. Technical Report.Google Scholar
- W. Arthur and D. Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress.Google Scholar
- Victor Costan and Srinivas Devadas. 2016. Intel sgx explained.IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1–118.Google Scholar
- Jordi Cucurull and Sandra Guasch. 2014. Virtual TPM for a secure cloud: fallacy or reality? (2014).Google Scholar
- Cybersecurity and Infrastructure Security Agency. 2021. SECURITY GUIDANCE FOR 5G CLOUD INFRASTRUCTURES - Part II: Securely Isolate Network Resources. https://www.cisa.gov/sites/default/files/publications/Security_Guidance_For_5G_Cloud_Infrastructures_Part_II_Updated_508_Compliant.pdf. Accessed: 2023-05-13.Google Scholar
- Cybersecurity and Infrastructure Security Agency. 2023. Zero Trust Maturity Model. https://www.cisa.gov/zero-trust-maturity-model. Accessed: 2023-05-13.Google Scholar
- Eduardo Falcão, Matteus Silva, Ariel Luz, and Andrey Brito. 2022. Supporting Confidential Workloads in SPIRE. In 2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 186–193. https://doi.org/10.1109/CloudCom55334.2022.00035Google ScholarCross Ref
- Daniel Feldman, Emily Fox, Evan Gilman, Ian Haken, Frederick Kautz, Umair Khan, Max Lambrecht, Brandon Lum, Agustín M. Fayó, Eli Nesterov, Andres Vega, and Michael Wardrop. 2020. Solving the Bottom Turtle: a SPIFFE way to establish trust in your infrastructure via universal identity.Google Scholar
- Dennis Gannon, Roger Barga, and Neel Sundaresan. 2017. Cloud-Native Applications. IEEE Cloud Computing 4, 5 (2017), 16–21. https://doi.org/10.1109/MCC.2017.4250939Google ScholarCross Ref
- ITU-T Study Group 17. 2023. Determined new Recommendation ITU-T X.1644 (X.sgdc): Security Guidelines for distributed cloud. https://spiffe.io/docs/latest/spire-about/spire-concepts/.Google Scholar
- Joseph R. Biden Jr.2021. Improving the nation’s cybersecurity. National Archives and Records Administration, College Park, MD, USA, Executive order 14028. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/. Accessed: 2023-05-13.Google Scholar
- Hagen Lauer, Amin Sakzad, Carsten Rudolph, and Surya Nepal. 2019. Bootstrapping Trust in a "Trusted" Virtualized Platform. In Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race (London, United Kingdom) (CYSARM’19). Association for Computing Machinery, New York, NY, USA, 11–22. https://doi.org/10.1145/3338511.3357347Google ScholarDigital Library
- Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang. 2022. A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. In 2022 IEEE Symposium on Security and Privacy (SP). 337–351. https://doi.org/10.1109/SP46214.2022.9833768Google ScholarCross Ref
- Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1257–1272. https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuanGoogle Scholar
- Wojciech Ozga, Do Le Quoc, and Christof Fetzer. 2021. TRIGLAV: Remote Attestation of the Virtual Machine’s Runtime Integrity in Public Clouds. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). 1–12. https://doi.org/10.1109/CLOUD53861.2021.00013Google ScholarCross Ref
- Bryan Parno. 2008. Bootstrapping Trust in a "Trusted" Platform. In Proceedings of the 3rd Conference on Hot Topics in Security (San Jose, CA) (HOTSEC’08). USENIX Association, USA, Article 9, 6 pages.Google ScholarDigital Library
- Scott Rose, Oliver Borchert, Stuart Mitchell, and Sean Connelly. 2020. Zero Trust Architecture. Technical Report NIST Special Publication (SP). National Institute of Standards and Technology, Gaithersburg, MD. https://doi.org/10.6028/NIST.SP.800-207Google Scholar
- SPIFFE. 2023. SPIRE Concepts. https://www.itu.int/md/T22-SG17-R-0021/en. Accessed: 2023-09-06.Google Scholar
- Marcela Tassyany, Ramon Sarmento, Eduardo Falcão, Reinaldo Gomes, and Andrey Brito. 2021. Um Mecanismo de aprovisionamento de Identidades para Microsserviços Baseado na Integridade do Ambiente de Execução. In Anais do XXXIX Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (Uberlândia). SBC, Porto Alegre, RS, Brasil, 714–727. https://doi.org/10.5753/sbrc.2021.16758Google ScholarCross Ref
- Rory Ward and Betsy Beyer. 2014. BeyondCorp: A new approach to enterprise security. (2014). https://storage.googleapis.com/pub-tools-public-publication-data/pdf/43231.pdf.Google Scholar
Index Terms
- Attesting AMD SEV-SNP Virtual Machines with SPIRE
Recommendations
Trustworthy confidential virtual machines for the masses
Middleware '23: Proceedings of the 24th International Middleware ConferenceConfidential computing alleviates the concerns of distrustful customers by removing the cloud provider from their trusted computing base and resolves their disincentive to migrate their workloads to the cloud. This is facilitated by new hardware ...
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityDespite the recent exponential growth in cloud adoption, businesses that handle sensitive data (e.g., health and financial sectors) are hesitant to migrate their on-premises IT infrastructure to the public cloud due to the lack of trust on the cloud ...
Traffic-sensitive live migration of virtual machines
CCGRID '15: Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingIn this paper we address the problem of network contention between the migration traffic and the Virtual Machine (VM) application traffic for the live migration of co-located Virtual Machines. When VMs are migrated with pre-copy, they run at the source ...
Comments