Sakul Gupta, is a Sr. Principal Security Firmware, Member Of Technical Staff at Micron Technology Inc, leading Secure Enclave firmware development on CXL DDR memory controllers and contributes to SSD security. He provides thought leadership from Micron to forums like the various memory and storage working groups, OCP Security Working Group, DMTF's SPDM, RAS working groups, Chips Alliance Caliptra working group, and participates in JEDEC working groups. He has worked in the industry for 24+ years working on CXL and DRAM Security, Safety Level Integrity-4 products, touch and biometric sensors for Apple, Samsung, from companies like Micron, Honeywell, Synaptics, Apple.
Confidential Compute (CC) completes the trifecta of data and code Protection - while in use via Trusted Execution Environments (TEEs). It ensures the ‘CIA’ Confidentiality Integrity and Authenticity, during data processing for secure and privacy-preserving computing. The key enablers of CC include Secure Boot, Attestation - DMTF SPDM, Memory Encryption.Data center industry’s goal is to make CC ubiquitous, to minimize performance hit / friction, for wider and seamless, reliable FW / SW updates and adoption.CC using HW-based, attested TEEs, protects sensitive data and code against threats during data execution.It allows for the protection of data in use, even against an adversarial platform owner.This is achieved through, Hardware-based isolation (e.g., Intel SGX, AMD SEV, CXL TE bits, ARM Realms CCA), attestation to verify the integrity of the TEE before use. Orchestration of CC over memory fabric is also done.CXL TSP defines mechanisms to include CXL memory devices within the TEE. CXL tracks cache coherence at the cache line level, 64 bytes.The talk will go into security requirements and behaviors that are used to support CC use cases and cover architecture and design of CC.