Contêineres confidenciais com Red Hat OpenShift Container Platform e IBM® Secure Execution for Linux - Blog da IBM

Contêineres confidenciais com Red Hat OpenShift Container Platform e IBM® Secure Execution for Linux – Blog da IBM

Nó Fonte: 3054129


Contêineres confidenciais com Red Hat OpenShift Container Platform e IBM® Secure Execution for Linux – Blog da IBM



Contêineres Red Hat OpenShift

A nuvem híbrida se tornou a dominant approach for enterprise cloud strategies, but it comes with complexity and concerns over integration, security and skills. To address these concerns the industry is embracing container runtime environments to abstract away infrastructure. Red Hat OpenShift Container Platform (RH OCP) surgiu como um leading solution for supporting the application development lifecycle, provisioning and managing container images and workloads into a platform for containerized applications and ecosystem. RH OCP provides a common deployment, control and management environment for workloads across a diverse set of infrastructures that underpin a hybrid cloud. 

In brief, Red Hat OpenShift is the leading hybrid cloud application platform built on open-source innovation designed to build, deploy and run applications at massive scale, wherever you want. 

Hybrid cloud is also forcing a significant rethinking of how to secure and protect data and assets. As such, the industry continues to move away from traditional moat-and-castle strategies towards zero trust-based architectures that micro-segment environments to minimize attack surfaces. 

Computação confidencial is an emerging foundational capability that enables the protection of data-in-use. The protection of data-at-rest and data-in-motion has been a standard practice in the industry for decades; however, with advent of hybrid and decentralized management of infrastructure it has now become imperative to equally protect data-in-use. More specifically, confidential computing uses hardware-based security-rich enclaves to allow a tenant to host workloads and data on untrusted infrastructure while ensuring that their workloads and data cannot be read or modified by anyone with privileged access to that infrastructure. This is typically referred to as technical assurance that can summarily be described as a provider or person cannot access your data. One can contrast technical assurance to the more commonly used operational assurance that provides the lesser guarantee that a provider or person only promises they will not access your data, even though they technically could. As compromised credential threats as well as insider threats have become a dominant cause of data-security incidents, technical assurance has become a priority for securing sensitive and regulated workloads whether the latter are running in traditional on-premises or in a public cloud data centers. 

IBM and RedHat have recognized the requirement for technical assurance in a hybrid cloud platform. They have worked as part of the Cloud Native Computing Foundation (CNCF) Confidential Containers open-source community to address this concern and are continuously working together to make confidential container technology available. The latter marries security-rich enclave technology such as IBM Secure Execution for Linux with Kubernetes-based OpenShift to allow for the deployment of containers into secured pods, providing all the advantages of a ubiquitous RH OCP operational experience while also designed to protect a tenant’s containers from privileged user access. Confidential containers go beyond prior efforts at solving this problem by isolating the container not only from infrastructure administrator but also from the Kubernetes administrator. This provides the tenant with the best of both worlds where they can fully leverage the abstraction of a managed OpenShift to develop-once-deploy-anywhere while being able to deploy data and workloads with technical assurance into a fully private and isolated enclave even if the latter is hosted and managed on third-party infrastructure.

IBM is further adding additional zero trust principles designed to increase security and ease of use with the IBM Hyper Protect Platform.

This unique capability is designed for workloads that have strong data sovereignty, regulatory or data privacy requirements. 

As such, confidential containers play a key role across industries engineered to secure data and foster innovation. Some example use cases to highlight: 

Confidential AI: leverage trustworthy AI and while ensuring the integrity of the models and confidentiality of data 

Organizations leveraging AI models often encounter challenges related to the privacy and security of the data used for training and the integrity of the AI models themselves. Protecting the confidentiality of proprietary algorithms and sensitive training data is crucial. In many cases multiple party must collaborate and share sensitive data or models between each other to gain valuable AI-based insights. On the other hand, the valuable data needed to gain those insights has to stay confidential and is only allowed to be shared with certain parties or no third parties at all. 

So, is there a way to gain insights of valuable data through AI without the need to expose the data set or the AI model (LLM, ML, DL) to another party? 

Red Hat OpenShift, empowered by Confidential Containers based on IBM Secure Execution, provides a confidential AI platform. This safeguards both the AI model and the training data, allowing organizations to deploy machine learning models without compromising intellectual property or exposing sensitive information. By mitigating attack vectors through security-rich containers, Confidential Containers ensure the integrity of AI models, enhancing trust in AI applications. 

Healthcare: enabling health tech while keeping patient data private 

In the healthcare industry, the protection of sensitive patient data is paramount. With the increasing adoption of digital health records and collaborative research initiatives, there’s a growing concern about securing patient information from unauthorized access and potential breaches. 

Red Hat OpenShift, leveraging Confidential Containers, establishes a security-rich enclave for healthcare applications. So that records and sensitive medical data are encrypted and processed securely, protecting against data leaks and unauthorized access. By safeguarding both the code and data, healthcare organizations are able to confidently embrace digital transformation while keeping their patients’ privacy by adopting data privacy-enhancing technologies, such as Confidential Compute. 

This is designed to enable multiple use cases in the healthcare industry, one being secure multi-party collaboration between different institutions as shown in the following example.  

Financial services: innovate customer experience while keeping sensitive information secure and stay compliant 

Financial institutions face constant threats to their critical data and financial transactions. The industry demands a secure infrastructure that can protect sensitive financial information, prevent fraud and ensure regulatory compliance. 

Red Hat OpenShift with confidential containers provides a fortified environment for financial services applications. This ensures that financial data and transactions are processed within security-rich enclaves, shielding them from external threats. By safeguarding code and data integrity, confidential containers on OpenShift helps financial institutions meet stringent regulatory requirements and enhances the overall security posture of their digital infrastructure. 

Enhancing digital rights management and intellectual property protection through confidential compute-protected tokenization 

In today’s digital landscape, the risk associated with stolen tokens or unauthorized signing of corresponding contracts, such as intellectual property and digital rights tokens, poses significant challenges. The potential financial losses and threats to the integrity of digital ecosystems demand a robust solution that goes beyond conventional security measures. 

Confidential compute offers a practical solution to the risks associated with stolen tokens by incorporating confidential compute technology into the tokenization process, which is designed to establish end-to-end security. This approach ensures that sensitive operations occur in a secure and isolated environment, safeguarding the confidentiality and integrity of digital assets throughout their lifecycle. Confidential compute is engineered to prevent malicious actors from deciphering or manipulating sensitive information even if they gain access to the underlying infrastructure.  

Implementing security-rich token platforms through confidential compute delivers tangible benefits. Digital rights holders can manage and monetize their intellectual property without the constant concern of piracy or unauthorized distribution. Stakeholders in various industries gain the ability to create, trade and enforce digital contracts with increased confidence in the security of their tokenized assets. Financial implications tied to token theft are significantly minimized, reducing the risk of revenue loss due to piracy or counterfeiting. This not only protects the economic interests of content creators and distributors but also promotes a more trustworthy digital ecosystem. 

In conclusion, the adoption of confidential compute in the tokenization process addresses the crucial challenge of the expanding set of use cases from financial assets, real estate and to much larger scale tokens securing digital rights and intellectual property. The outcome is a shift towards more security-rich token platforms, providing content creators, distributors and consumers the confidence to engage in digital transactions while ensuring the sustained growth and integrity of the digital economy. 

One example of growing use for tokens is online gaming. Confidential compute’s integration into tokenization safeguards in-game assets like virtual currencies and items. This is designed to promote heightened security, minimizing the financial risks and disruptions caused by stolen tokens in the dynamic landscape of online gaming. 

Sovereign cloud: enhance data security to enable data privacy and sovereignty 

National security and data sovereignty concerns drive the need for a secure hybrid cloud infrastructure that is designed to ensure that critical data and applications are not subject to unauthorized access or foreign jurisdiction. 

Red Hat OpenShift, with confidential container capabilities, supports the implementation of sovereign clouds. By establishing secure containers, it enables nations to host critical applications and data within a protected environment, promoting data sovereignty and protecting against external threats. This solution provides a trusted platform for government agencies and critical infrastructure, fostering national security in the digital age. 

Zero Trust SaaS: succeed at your SaaS transformation while keeping your client’s data private by applying built-in zero trust principles 

As a SaaS provider aiming to offer scalable solutions to target customers with sensitive data or regulatory requirements, the challenge lies in providing cloud-based services without compromising the security and confidentiality of clients’ data. The need for a comprehensive Zero Trust framework becomes crucial to assure clients that their sensitive information remains inaccessible, not only by the SaaS provider but also by the underlying cloud infrastructure. 

Red Hat OpenShift, fortified with confidential containers and integrated with Zero Trust as a service, revolutionizes the approach to Zero Trust SaaS from the provider’s standpoint. This solution helps that the SaaS provider, the cloud provider, IaaS Admin, and Kubernetes Admin have zero access to clients’ data. 

The absence of isolation between different clusters within the cloud environment not only helps to optimize costs but also streamlines operational efficiency. Simultaneously, the isolation at the pod level within each cluster’s namespace enhances security, contributing to reduced certification audit efforts and reinforcing the SaaS provider’s commitment to data integrity. 

Moreover, the implementation of multi-party Zero Trust allows clients and 4th party ISVs to run confidential workloads as containers without direct access to the underlying data. This innovative approach not only meets the stringent security requirements of clients but also positions the SaaS provider as a trusted partner capable of delivering scalable and security-rich solutions for clients with sensitive data or regulatory constraints. 

Learn more about Confidential Compute with IBM Secure Execution on IBM LinuxONE


Mais da nuvem híbrida




A batalha das personas no mundo dos aplicativos corporativos – como o IBM Hybrid Cloud Mesh e o Red Hat Services Interconnect os unificam

3 min ler - Navegar no intrincado reino dos aplicativos empresariais modernos exige a colaboração entre diversas pessoas para gerenciar a complexidade com eficácia. Isso ajuda no suporte contínuo aos negócios por meio de aplicativos que automatizam fluxos de trabalho essenciais. Tradicionalmente, os aplicativos e sua infraestrutura de hospedagem se alinham com DevOps e CloudOps. No entanto, o aumento dos custos devido à diversidade de ambientes de TI levou ao surgimento de FinOps, com foco no monitoramento e controle de despesas. Várias personas na implantação de aplicativos introduziram fluxos de trabalho altamente complexos. Normalmente, DevOps inicia solicitações, examinadas por CloudOps, NetOps, SecOps e…




Como a direção do tráfego DNS amplia o valor comercial das redes híbridas e multicloud

4 min ler - Na versão mais recente do seu “Cloud Hype Cycle”, o Gartner colocou as operações de rede multi-cloud no “pico das expectativas inflacionadas, perigosamente perto do 'vale da decepção'”. networking em um nível agregado, há uma abundância de nuances escondidas na avaliação do Gartner. O desafio é que a nuvem híbrida e a multicloud são o presente e o futuro das redes. É uma área que parece estar produzindo…




java-microserviços-em-servidores-de-aplicativos-de-código-aberto

3 min ler - Migre do seu servidor de aplicativos JEE atual para o Open Liberty em algumas etapas fáceis A série de nove partes Migrando microsserviços Java do Spring Boot para o MicroProfile abordou os componentes subjacentes do Eclipse MicroProfile, como o cliente Rest para criação de APIs para aplicativos de microsserviços, dependência de contexto Injeção para suporte à fiação baseada em anotações, Tolerância a falhas para recuperação de problemas e OpenTracing para diagnosticar problemas de serviço. Este breve blog aborda instruções específicas: etapas simples para migrar do seu servidor de aplicativos JEE atual para o Open Liberty, um sistema de nível empresarial…




Expandindo os recursos de data warehouse para a IBM Hybrid Data Management Platform

2 min ler - Agora você pode implementar instâncias Flex e Flex Performance com a IBM Hybrid Data Management Platform. Encontrar uma solução de armazenamento verdadeiramente elástica e escalável pode fazer ou quebrar seus negócios, especialmente à medida que as arquiteturas de dados atuais se tornam cada vez mais complexas. À medida que as empresas continuam a oferecer suporte a novos casos de uso, tipos de carga de trabalho e locais, fica claro que as empresas precisam de liberdade e flexibilidade para escolher o armazém certo para o trabalho. É por isso que no final do ano passado, o Db2 Warehouse em…

Boletins informativos da IBM

Receba nossos boletins informativos e atualizações de tópicos que oferecem as mais recentes lideranças inovadoras e insights sobre tendências emergentes.

Inscreva-se agora

Mais boletins informativos

Carimbo de hora:

Mais de IBM