Azure and AMD announce landmark in confidential computing evolution

Mark Rus­si­no­vich Chief Tech­no­lo­gy Offi­cer and Tech­ni­cal Fel­low, Micro­soft Azure

The pan­de­mic has acce­le­ra­ted digi­tal trans­for­ma­ti­on glo­bal­ly and the sca­la­bi­li­ty and secu­ri­ty advan­ta­ges offe­red by Micro­soft Azu­re have hel­ped many cus­to­mers move for­ward. One key tenet we have in Azu­re is that your data is your data.

In Azu­re, we take your data secu­ri­ty serious­ly and have built num­e­rous con­trols around data at rest and data at flight. As a foun­ding mem­ber of the Con­fi­den­ti­al Com­pu­ting Con­sor­ti­um, we are also an inno­va­tor in con­fi­den­ti­al com­pu­ting which extends tho­se pro­tec­tions to data run­ning on the pro­ces­sor its­elf. For more than 3 years finan­cial ser­vices, govern­ments, health care pro­vi­ders, and even mes­sa­ging com­pa­nies have been using Azu­re con­fi­den­ti­al com­pu­ting to unlock new sce­na­ri­os like mul­ti-par­ty machi­ne lear­ning and move their more sen­si­ti­ve appli­ca­ti­ons to the cloud.

Today, I am announ­cing that we are fur­ther broa­de­ning the con­fi­den­ti­al com­pu­ting opti­ons available to Azu­re cus­to­mers through our tech­no­lo­gy part­ner­ship with AMD, spe­ci­fi­cal­ly by being the first major cloud pro­vi­der to offer con­fi­den­ti­al vir­tu­al machi­nes on the new AMD EPYC™ 7003 series pro­ces­sors. This new approach com­ple­ments exis­ting Azu­re con­fi­den­ti­al com­pu­ting solu­ti­ons such as con­fi­den­ti­al con­tai­ners for Azu­re Kuber­netes Ser­vice and opens the pos­si­bi­li­ty to crea­te new con­fi­den­ti­al appli­ca­ti­ons wit­hout requi­ring code modi­fi­ca­ti­ons which in turn sub­stan­ti­al­ly sim­pli­fies the pro­cess of crea­ting con­fi­den­ti­al applications.

Key tech­no­lo­gy enablers to the AMD-cen­te­red solu­ti­on include the advan­ced secu­ri­ty fea­ture cal­led Secu­re Encrypt­ed Vir­tua­liza­ti­on-Secu­re Nes­ted Paging, or SEV-SNP. SEV-SNP enables pro­tec­tion of vir­tu­al machi­nes by crea­ting a trus­ted exe­cu­ti­on envi­ron­ment and has been sub­stan­ti­al­ly enhan­ced in the 3rd Gen AMD EPYC processor.

The­se AMD EPYC-CPU powered Azu­re VMs are ful­ly encrypt­ed at run­time, ful­fil­ling the pro­mi­se of con­fi­den­ti­al com­pu­ting by pro­tec­ting your data even when it is in use. The encryp­ti­on keys used for VM encryp­ti­on are gene­ra­ted, and safe­guard­ed, by a dedi­ca­ted secu­re pro­ces­sor on the EPYC CPU. This helps ensu­re that no one, even cloud administrators—and by exten­si­on the workloads, apps, or data in the VMs—have access to the­se encryp­ti­on keys.

Bey­ond the hard­ware, Azu­re pro­vi­des a set of important ser­vices, inclu­ding the Azu­re Atte­sta­ti­on ser­vice and trus­ted launch, to fur­ther help our cus­to­mers. The Azu­re Atte­sta­ti­on ser­vice coll­ects evi­dence that the hard­ware envi­ron­ment is cor­rect and then pro­vi­des a cryp­to­gra­phic signal to Azu­re Key Vault to secu­re­ly release the decryp­ti­on key for the vir­tu­al machi­ne image only if the envi­ron­ment is in a known good sta­te. Sub­se­quent­ly, the decrypt­ed vir­tu­al machi­ne boot pro­cess is sub­jec­ted to trus­ted launch to defend against boot­kits, root­kits, and ker­nel-level mal­wa­re. In this step, trus­ted launch mea­su­res the inte­gri­ty of the vir­tu­al machi­ne image against infor­ma­ti­on stored in the vTPM befo­re con­ti­nuing boot processes.

Cus­to­mers can also bring a ful­ly encrypt­ed disk image to Azu­re, ensu­ring that the image is never available in plain text to the Azu­re envi­ron­ment. In this sce­na­rio, the cus­to­mer pre­pa­res the disk image in their local envi­ron­ment using their own keys and then uploads the image to Azu­re while pla­cing the keys in Azure’s sin­gle ten­ant FIPS level 3 com­pli­ance mana­ged HSM.

In summary

With the 3rd Gen AMD EPYC CPU-backed con­fi­den­ti­al com­pu­ting VMs, Azu­re con­fi­den­ti­al com­pu­ting now enables cus­to­mers to encrypt enti­re VMs con­fi­den­ti­al­ly, enable con­fi­den­tia­li­ty wit­hout recom­pi­ling code, and bene­fit from a host of Azu­re-spe­ci­fic enhance­ments. Today you can deli­ver con­fi­den­ti­al workloads on Azu­re with the broa­dest choice of hard­ware as well as resour­ces span­ning vir­tu­al machi­nes, con­tai­ners, SQL, and beyond.

Sign up for Pri­va­te Pre­view of Azu­re Con­fi­den­ti­al VMs.