Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

VMware, Other Tech Giants Announce Push for Confidential Computing Standards

VMware partners with tech giants to accelerate the development of confidential computing applications.

In conjunction with the 2023 Confidential Computing Summit last week, VMware announced a partnership with tech giants to accelerate the development of confidential computing applications.

Confidential computing relies on a trusted execution environment that ensures the integrity and confidentiality of applications and data, even in the cloud and on third-party infrastructure.

With the emergence of multi-cloud deployments and machine learning, confidential computing is expected to help protect intellectual property and sensitive data, but its adoption lags due to difficulties in creating applications for it.

To help overcome obstacles in implementing confidential computing, VMware has been working on a developer-focused Certifier Framework for Confidential Computing project that now has support from AMD, Samsung, and members of the RISC-V Keystone community.

In a push for the adoption of confidential computing, the open source Certifier Framework provides a standardized, platform-agnostic API for building and operating confidential computing applications, which is paired with a policy evaluation server, the Certifier Service.

“The Certifier API greatly simplifies and unifies programming and operations support for multi-vendor Confidential Computing platforms by providing simple client trust management, including attestation evaluation, secure storage, platform initialization, secret sharing, secure channels and other services,” VMware explains.

The accompanying Certifier Service supports trust management, including attestation evaluation, application upgrade, and other related services.

By offering support for defining and implementing trust policies, the Certifier Framework aims to simplify the development of privacy-focused applications, secure cloud workloads, and secret-preserving services.

Advertisement. Scroll to continue reading.

VMware is inviting the community to review and contribute to the open source Certifier Framework, to standardize the platform-independent APIs and to drive the development of confidential computing code for x86, Arm, and RISC-V ecosystems.

“Confidential Computing has the potential to secure workloads no matter where they run including in multi-cloud and edge settings. The challenge has been to help customers adopt and implement the standard with ease,” VMware CTO Kit Colbert said.

Related: Intel Adds TDX to Confidential Computing Portfolio With Launch of 4th Gen Xeon Processors

Related: Securing Data-in-Use With Confidential Computing

Related: Tech Giants Join Forces on Confidential Computing

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

Lou Serlenga has joined Bitsight as Chief Revenue Officer (CRO), following leadership roles at Tenable, Nile, and HPE.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.