• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Microsoft Declares ‘General Availability’ of Threat Experts Security Service

Azure’s Hardware Security Feature Takes Cues from Xbox One

December 10, 2020
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Releases Azure Firewall Premium in Public Preview

February 26, 2021
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

February 25, 2021
8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

February 25, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

February 25, 2021
Innovative solutions for IT workers at home

ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

February 24, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

February 24, 2021
Innovative solutions for IT workers at home

SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

February 23, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

February 23, 2021
How to use Microsoft Sysmon, Azure Sentinel to log security events

OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

February 22, 2021
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Sunday, February 28, 2021
  • Login
Azure Security News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    How to use Microsoft Sysmon, Azure Sentinel to log security events

    Microsoft Cloud Announces Three New Vertical Cloud Solutions

    Innovative solutions for IT workers at home

    Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

    Innovative solutions for IT workers at home

    What is database encryption?

    A moment of reckoning: the need for a strong and global cybersecurity response

    Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

    Innovative solutions for IT workers at home

    ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

    A moment of reckoning: the need for a strong and global cybersecurity response

    ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

    Innovative solutions for IT workers at home

    SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

    8×8 makes raft of updates to platform

    Indonesian Mobile Operator Selects NTT for Microsoft Security Project

    Microsoft To Build New Azure Cloud Data Centers In Greece

    NTT completes Microsoft security project for Indonesian mobile operator

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech
    • All
    • Apps
    • Gear
    • Mobile
    • Startup
    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Releases Azure Firewall Premium in Public Preview

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

    8×8 makes raft of updates to platform

    Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

    How to use Microsoft Sysmon, Azure Sentinel to log security events

    OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

    Microsoft To Open Azure Cloud Data Center Region In Spain

    EMC Corporation Townsend security Hewlett-Packard Enterprise Gemalto N.V. Microsoft Azure Google Thales e-security International Business Machines (IBM) Broadcom

    A moment of reckoning: the need for a strong and global cybersecurity response

    Azure Engineer at VillageMD

    Innovative solutions for IT workers at home

    How to Sync On-Premise Active Directory Passwords with Office 365 and Google Apps in Real-Time

    Microsoft Azure Forms Collaboration to Enhance AI in Healthcare

    Azure Defender is now available for all IoT and OT devices

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Google and Microsoft ID Group Targeting Security Researchers

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
    • All
    • Gaming
    • Movie
    • Music
    • Sports
    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Twitter tweaks video again, adding view counts for some users

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    People are handing out badges at Tube stations to tackle loneliness

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    This Filipino guy channels his inner Miss Universe by strutting in six-inch heels and speedos

    Oil spill off India’s southern coast leaves fisherman stranded, marine life impacted

  • Lifestyle
    • All
    • Fashion
    • Food
    • Health
    • Travel
    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Offers More ‘Solorigate’ Advice Using Microsoft 365 Defender Tools

    A moment of reckoning: the need for a strong and global cybersecurity response

    Solar Winds, Office 365 & Shipbuilding…

    Aruba ClearPass Policy Manager Integrates with Microsoft

    Imprivata Expands Collaboration with Microsoft on New Digital Identity Innovations

    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Canada’s 10 biggest stories of 2020

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    AMD breaks revenue records for 2019 and 4Q

    AMD breaks revenue records for 2019 and 4Q

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft is killing off insecure Cloud App Security cipher suites

    Microsoft is killing off insecure Cloud App Security cipher suites

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Azure Security News
No Result
View All Result
Home News

Azure’s Hardware Security Feature Takes Cues from Xbox One

by AZURE SECURITY NEWS EDITOR
December 10, 2020
in News
0
Microsoft Declares ‘General Availability’ of Threat Experts Security Service
492
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

In designing new secure enclaves for Kubernetes clusters, Microsoft used engineering work done for its gaming console.

Machine learning unlocks a universe of new possibilities – in medical research, for example, or in financial fraud protection. But training machine learning models requires vast pools of real-world data. In both cases used as examples here, the data is highly sensitive, and there are regulations in place to keep it private and secure.

The concept of “confidential computing” was devised to get around this issue. It uses hardware-level memory protection to work with encrypted data without exposing it to the rest of the system. In November, Microsoft announced it was bringing confidential computing built into Azure infrastructure to Kubernetes clusters.

Related: Microsoft Security Splash: What It Means for the Tech Giant

Its open-source Open Enclave SDK lets you create trusted execution environments (TEEs) on IoT devices and, with the Open Enclave SDK Plugin, in Kubernetes-managed containers, using secure hardware, such as Arm TrustZone or Intel SGX (Software Guard Extensions), to isolate workloads that process sensitive data.

A lot of the engineering work that went into the solution was done for what Dave Weston, director of OS security at Microsoft, called “the most secure product Microsoft has ever produced and maybe the most secure [device] out there:” the Xbox One.

The gaming console has a custom SOC with hardware keys fused into it at the factory (so they can’t be extracted), a high-performance streaming cryptography processor, and hardware hypervisor support. It runs every game in a separate security domain, with the host OS in another, using a tiny version of Hyper-V, isolating credentials and encryption keys in the same way Azure does, so even the machine admin can’t get at them. It also uses hardware-supported memory encryption throughout the platform, which Weston described as “very similar to Azure Confidential Computing.”

If the Xbox isn’t secure, “no-one is going to pay for video games,” he said. But the same concepts of secure enclaves and hardware-protected memory can protect financial, medical, and industrial computing.

Protected Data May Hold Big Insights

Medical datasets are extremely privacy-sensitive, “and yet inside those datasets lie insights that we can unlock that can be used to help advance medical care for everyone,” Gabe Monroy, director of Azure Compute at Microsoft, told Data Center Knowledge. “With this technology, we’re now making it possible to run a model and do analysis on these datasets in a way where people can share the data but also get the assurance that you’re not violating these privacy concerns.”

Similarly, financial services firms can pool data to train fraud-detection models across a myriad of payment datasets while staying within the privacy compliance guardrails. “There’s just a whole host of workloads” that could use the technology, Monroy said.

“Through this device-driver plugin (the Open Enclave SDK Plugin) we’re bringing a level of security assurance down to the metal, down to the chip,” he said. “What is happening at the chipset level has the opportunity to provide a level of assurance that you just can’t get with a software-based solution.”

How Trustworthy are Trusted Enclaves?

As software security improves, attackers are focusing their attention on hardware, including security hardware. Researchers have found vulnerabilities in Arm’s TrustZone and Intel SGX, but there are also some built-in protections.

The most recent SGX vulnerability has the catchy but misleading name of Plundervolt. The contents of the enclave aren’t exposed as they could be with the Specter and Foreshadow speculative execution flaws. Instead, they are corrupted by reducing the voltage sent to the CPU while it’s executing enclave computations. Those voltage tweaks require root access on the server and are disabled by the microcode and BIOS updates Intel released as a fix.

Corrupting data would certainly be an issue for a secure workload like confidential computing, but mainly as a denial of service. SGX includes an attestation infrastructure, so workloads can verify the security state on an enclave and enforce policy on whether to trust it or not.

The Xbox One system has built-in protection for voltage manipulation, in case gamers use mod chips to load code that bypasses the game security.  But this protection is rather final: it blows fuses and makes the device unusable.

Enclaves are designed to let you work with data in memory without having to worry about that memory being exposed to an attack. SGX uses both CPU instructions and a hardware Memory Encryption Engine to protect data as it leaves the CPU.

“Its role is to help protect the confidentiality, integrity, and freshness of the CPU-DRAM traffic over a configurated memory range,” Anil Rao, Intel VP for Data Center Security and Systems Architecture, explained to Data Center Knowledge.

Enclaves aren’t designed to protect against side-channel attacks on the cache line; it’s about being able to rely on encryption keys derived from hardware keys to protect information and communicate securely between enclaves, he added. Trusted Execution Environments “provide a form of isolation for code and data in such a way that the code and data are cryptographically isolated from other code or operators.”

“A TEE cannot protect you against all forms of attack, but combined with other common security best practices, it adds a powerful additional layer of data protection,” Rao suggested. You probably don’t want to blow the fuses in your Kubernetes cluster if you find signs of tampering the way an Xbox One does, but the attestation should mean you’ll know it’s no longer a trusted environment.

Reference:https://www.datacenterknowledge.com/microsoft/azure-s-hardware-security-feature-takes-cues-xbox-one

Share197Tweet123Share49
AZURE SECURITY NEWS EDITOR

AZURE SECURITY NEWS EDITOR

Related Posts

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

by AZURE SECURITY NEWS EDITOR
February 26, 2021
0

Microsoft is boosting its industry-cloud solutions with the announcement of three new programs. To help get these new Azure offerings...

Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

by AZURE SECURITY NEWS EDITOR
February 26, 2021
0

 Privacera, the cloud data governance and security leader founded by the creators of Apache Ranger™, today announced a technology partnership...

Innovative solutions for IT workers at home

What is database encryption?

by AZURE SECURITY NEWS EDITOR
February 26, 2021
0

Database encryption protects sensitive information by scrambling the data when it’s stored, or, as it has become popular to say,...

A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

by AZURE SECURITY NEWS EDITOR
February 25, 2021
0

Latest launched research document on Global Cloud Security in Banking Market study of 111 Pages provides detailed analysis with presentable...

  • Trending
  • Comments
  • Latest
Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

AZURE DEFAULT RESOURCE GROUP AND DEFAULT WORKSPACE: WHAT ARE THEY?

December 14, 2020
Microsoft Seriously Beefs Up Security in Windows Server 2019

TCS Launches Cloud Exponence on Microsoft Azure

January 21, 2021
Microsoft Launches Host of Security Products in Time for RSA

Microsoft to add two new Microsoft 365 security, compliance bundles to its line-up

November 26, 2020

Lady Gaga Pulled Off One of the Best Halftime Shows Ever

0

Barack Obama’s Now Mainly Focusing on Wearing This Casual Backwards Hat

0

Watch Justin Timberlake’s ‘Cry Me a River’ Come to Life in Mesmerizing Dance

0
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
Azure Security News

Copyright © 2020 - Azure Security

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2020 - Azure Security

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In