Keeping data encrypted in memory with confidential computing

Cian Butler SRE@Evervault

Encrypt all the things.

Encryption at Rest

Encrypted Protocols

Whats missing?

Encryption in memory

Enclaves

Client Client Secure Enclave Secure Enclave Code changed

Lots of 3 letter acronyms

A diagram showing the breakdown of tee techs and their isolation models

The Problems

  • Observability
  • Userspace Networking
  • Time slippage

Observability

Loadtest Graphs showing performance improvements moving from k1 to r1 curve Loadtest Graphs showing performance improvements moving from m5 to c5 nodes

Userspace Networking

Graph showing performance difference show running a network request in a vm vs an enclave. Enclave is much lower then vm

Time slippage

There is no NTP in enclaves.

Attestation

Questions?