SlideShare a Scribd company logo
André Martin – https://sconedocs.github.io
SCONE
Secure Containers For Trustworthy Cloud Services:
Business Opportunities
MOTIVATION FOR SCONE
trusted client
computer remote untrusted
computers
input data
output data
SCONE: supports always
encrypted code and data
WHY SCONE? - THREAT MODEL
We do not trust the Cloud Provider:
➤ Attacker has root access on all machines
➤ Attacker has hardware access on all machines
➤ Attacker controls (credentials of) some but not all
stakeholders
➤ Attacker knows sufficient vulnerabilities in software
➤ Note: about one bug every 2k lines of source code
https://sconedocs.github.io
WHAT IS SCONE?
➤ Compiler framework to allow applications to run in Trusted
Execution Environment (TEEs) such as Intel SGX
➤ Offered as Docker images for easy composition
➤ Tight Integration into Docker and Kubernetes
➤ Secret management - Palæmon
➤ Attestation service
➤ Monotonic counter integration for license management etc.
https://sconedocs.github.io
THE SCONE PLATFORM
(HTTPS://SCONEDOCS.GITHUB.IO)
remote untrusted
computers
application
(no source
code changes)
SCONE:
• attests that the correct application is running!
• manages keys & secrets for applications
• de/encrypts data and files - transparent to
application
Palaemon
attests
SCONE secrets
management service
ADVANTAGES OF USING SCONE
➤ Easy integration in existing software stack/deployment – just
swap Docker image id
➤ Attests that the correct code is running
➤ Protects confidentiality, integrity and freshness of data and
code even against attackers with root privileges
➤ Provides an integrated secret management
➤ Can be used for a more secure licensing management
➤ Even if attacker would have root access…
SCONE FEATURES: ALL SECRETS ARE
PROTECTED BY POLICIES
data
remote untrusted
computers
encrypted
encrypted
Palaemon
SCONE
security
policy secrets
management
https://sconedocs.github.io
NO TRUST IN ANY INDIVIDUAL
OPERATORS / USERS / …
remote untrusted
computers
Palaemon
SCONE
security
policy
SCONE:
- policies are protected by policy boards
- members can be humans and (attested) scripts
- changes requires approval from all/majority/.. members
policy board (per policy)
/approve
https://sconedocs.github.io
Application
Provider
(provides container
images)
publishes
Data Owner
(wants to
monetize data)
Data scientist
(User)
uses
remote untrusted
computers
application
Palaemon
vol
operates cloud
uses
provides
Auditor
(checks source code)
provides
Service
Provider
(operates service)
checks
Infrastructure
Provider
(operates
computers &
services)
SCONE has Multi-
Stakeholder support!
SCONE
SCONE USE CASES & BUSINESS
OPPORTUNITIES➤ Medical domain:
➤ Electronic patient records
➤ AI / Machine Learning:
➤ Supports TensorFlow
➤ Blockchain domain:
➤ Decentralized applications
➤ Data-as-a-service
➤ General:
➤ Vault, Barbican, PySpark, Blender, …
SCONE DEMOS
➤ PySpark secure data processing:
https://www.youtube.com/watch?v=yI3iEFWUWbU
➤ TensorFlow demo
https://www.youtube.com/watch?v=mKgwUMIT8tM
SCONE PLATFORM ADVANTAGES
➤ SCONE supports protection of multiple stakeholders.
➤ SCONE has an integrated secrets&configuration management
➤ SCONE scales better (high performance syscall interface).
➤ SCONE generates smaller executables.
➤ SCONE comes with a toolchain.
➤ SCONE protects the OS interface.
➤ SCONE ensures better Linux compatibility.
➤ SCONE transparently attests applications.
➤ SCONE’s design is hardware independent.
https://sconedocs.github.io/

More Related Content

Secure containers for trustworthy cloud services: business opportunities

  • 1. André Martin – https://sconedocs.github.io SCONE Secure Containers For Trustworthy Cloud Services: Business Opportunities
  • 2. MOTIVATION FOR SCONE trusted client computer remote untrusted computers input data output data SCONE: supports always encrypted code and data
  • 3. WHY SCONE? - THREAT MODEL We do not trust the Cloud Provider: ➤ Attacker has root access on all machines ➤ Attacker has hardware access on all machines ➤ Attacker controls (credentials of) some but not all stakeholders ➤ Attacker knows sufficient vulnerabilities in software ➤ Note: about one bug every 2k lines of source code https://sconedocs.github.io
  • 4. WHAT IS SCONE? ➤ Compiler framework to allow applications to run in Trusted Execution Environment (TEEs) such as Intel SGX ➤ Offered as Docker images for easy composition ➤ Tight Integration into Docker and Kubernetes ➤ Secret management - Palæmon ➤ Attestation service ➤ Monotonic counter integration for license management etc. https://sconedocs.github.io
  • 5. THE SCONE PLATFORM (HTTPS://SCONEDOCS.GITHUB.IO) remote untrusted computers application (no source code changes) SCONE: • attests that the correct application is running! • manages keys & secrets for applications • de/encrypts data and files - transparent to application Palaemon attests SCONE secrets management service
  • 6. ADVANTAGES OF USING SCONE ➤ Easy integration in existing software stack/deployment – just swap Docker image id ➤ Attests that the correct code is running ➤ Protects confidentiality, integrity and freshness of data and code even against attackers with root privileges ➤ Provides an integrated secret management ➤ Can be used for a more secure licensing management ➤ Even if attacker would have root access…
  • 7. SCONE FEATURES: ALL SECRETS ARE PROTECTED BY POLICIES data remote untrusted computers encrypted encrypted Palaemon SCONE security policy secrets management https://sconedocs.github.io
  • 8. NO TRUST IN ANY INDIVIDUAL OPERATORS / USERS / … remote untrusted computers Palaemon SCONE security policy SCONE: - policies are protected by policy boards - members can be humans and (attested) scripts - changes requires approval from all/majority/.. members policy board (per policy) /approve https://sconedocs.github.io
  • 9. Application Provider (provides container images) publishes Data Owner (wants to monetize data) Data scientist (User) uses remote untrusted computers application Palaemon vol operates cloud uses provides Auditor (checks source code) provides Service Provider (operates service) checks Infrastructure Provider (operates computers & services) SCONE has Multi- Stakeholder support! SCONE
  • 10. SCONE USE CASES & BUSINESS OPPORTUNITIES➤ Medical domain: ➤ Electronic patient records ➤ AI / Machine Learning: ➤ Supports TensorFlow ➤ Blockchain domain: ➤ Decentralized applications ➤ Data-as-a-service ➤ General: ➤ Vault, Barbican, PySpark, Blender, …
  • 11. SCONE DEMOS ➤ PySpark secure data processing: https://www.youtube.com/watch?v=yI3iEFWUWbU ➤ TensorFlow demo https://www.youtube.com/watch?v=mKgwUMIT8tM
  • 12. SCONE PLATFORM ADVANTAGES ➤ SCONE supports protection of multiple stakeholders. ➤ SCONE has an integrated secrets&configuration management ➤ SCONE scales better (high performance syscall interface). ➤ SCONE generates smaller executables. ➤ SCONE comes with a toolchain. ➤ SCONE protects the OS interface. ➤ SCONE ensures better Linux compatibility. ➤ SCONE transparently attests applications. ➤ SCONE’s design is hardware independent.