Abstract
Confidential virtual machines (CVMs) are cloud providers' most recent security offer, providing confidentiality and integrity features. Although confidentiality protects the machine from the host operating system, firmware, and cloud operators, integrity protection is even more useful, enabling protection for a wider range of security issues. Unfortunately, CVM integrity verification depends on remote attestation protocols, which are not trivial for operators and differ largely among cloud providers. We propose an approach for abstracting CVM attestation that leverages an open-source standard, Cloud Native Foundation's Secure Production Identity Framework for Everyone (SPIFFE). Our approach can integrate smoothly even when applications are unaware of CVMs or the SPIFFE standard. Nevertheless, our implementation inherits SPIFFE flexibility for empowering access control when applications support SPIFFE. In terms of performance, CVMs incur an additional 1.3 s to 21.9 s in boot times (it varies with the cloud environment), a marginal degradation for CPU, RAM, and IO workloads (maximum degradation of 2.6%), and low but not imperceptible degradation for database workloads (between 3.6% to 7.13%). Finally, we provide usability mechanisms and a threat analysis to help users navigate cloud providers' different CVM implementations and resulting guarantees.
Publisher
Sociedade Brasileira de Computacao - SB
Reference41 articles.
1. Amazon Web Services (2024a). AWS Nitro System. Available online [link] Accessed: 2024-03-06.
2. Amazon Web Services (2024b). AWS UEFI source code for AMD SEV-SNP Confidential VMs. Available online [link] Accessed: 2024-03-06.
3. AMD (2020). AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. Technical report. Available online [link].
4. AMD (2022). SEV Secure Nested Paging Firmware ABI Specification. Technical report. Available online [link].
5. AMD (2023). AMD SEV-TIO: Trusted I/O for Secure Encrypted Virtualization. Technical report. Available online [link].