Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Produce a position paper on machine identity's role in overall Confidential Computing attestation #21

Open
TheBankster opened this issue Sep 26, 2023 · 7 comments

Comments

@TheBankster
Copy link
Collaborator

A recent post by me on LinkedIn has generated an outlier amount of engagement and a spirited discussion.
https://www.linkedin.com/posts/markfishelnovak_machine-identity-in-cybersecurity-and-iam-activity-7111375919142879232-2Li2

The SIG should research and publish a document (in the form of a position paper) around the role of machine identity in overall attestation. There are two camps: one (in which I find myself) claims that machines are pets, not cattle, and the actual security principal worth tracking is code identity, as established by TEE attestation. In that view, machine identity has a very limited role (such as a claim resulting from mapping of an endorsement certificate into machine location for jurisdictions that restrict where data processing can be done). The opposing camp feels that even those parts of the hosting machine outside of the "confidential TCB" are worth attesting for an improved security posture.

The answer will not be universal across scenarios. For instance, privacy considerations may discourage the use of machine identity, while cloud scenarios might call for it.

@muhammad-usama-sardar
Copy link
Contributor

muhammad-usama-sardar commented Sep 27, 2023

The SIG should research and publish a document (in the form of a position paper) around the role of machine identity in overall attestation.

IMHO such camps generally arise only due to vague terms, such as machine identity. So I personally see defining the term "machine identity" as a good first step.

Another perspective is that neither the document nor the presentation talk about confidential computing (CC). So it is reasonable to assume that CC was out of scope of the document and presentation.

In the CC context, I can imagine various things that may come under the umbrella of the term "machine identity", for example, for Intel TDX:

  • Platform Provisioning ID (PPID)
  • Platform Instance ID (PIID)
  • Family-Model-Stepping-PlatformCustomSKU (FMSPC)

Similarly, for Arm CCA:

  • CCA platform Implementation ID
  • CCA platform Instance ID

So the first logical step, in any case, is to define what exactly among others is what you refer to as "machine identity".

@TheBankster
Copy link
Collaborator Author

TheBankster commented Sep 27, 2023 via email

@thomas-fossati
Copy link
Contributor

thomas-fossati commented Sep 27, 2023

@TheBankster, FYI. Likely relevant to this -- as well as to the GRC SIG work -- is the "Scalable Remote Attestation for Systems, Containers, and Applications" document that Kathleen Moriarty (@KME) is pursuing in the RATS working group.

@TheBankster
Copy link
Collaborator Author

TheBankster commented Sep 27, 2023 via email

@thomas-fossati
Copy link
Contributor

Another perspective is that neither the document nor the presentation talk about confidential computing (CC). So it is reasonable to assume that CC was out of scope of the document and presentation.
[...]

@muhammad-usama-sardar the two links do not work (for me). Is there another way to access that content?

@muhammad-usama-sardar
Copy link
Contributor

@muhammad-usama-sardar the two links do not work (for me). Is there another way to access that content?

also does not work for me now. Anyway, I updated the links in my original comment. Please check. They work for me now.

If the links still do not work, the original link is here. There search for "Prefer to access this resource without an account?" and exactly below that there are two links for publication and presentation.

@thomas-fossati
Copy link
Contributor

@muhammad-usama-sardar the two links do not work (for me). Is there another way to access that content?

also does not work for me now. Anyway, I updated the links in my original comment. Please check. They work for me now.

If the links still do not work, the original link is here. There search for "Prefer to access this resource without an account?" and exactly below that there are two links for publication and presentation.

Awesome, thanks a lot Usama!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants