Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.


Today, on the second day of the Intel Vision conference, Intel announced the release of a new security-as-a-service solution called Project Amber. The solution is an independent trust authority, designed to remotely verify whether a compute asset in the cloud, network’s edge or on-premise environment is trustworthy. 

Project Amber supports confidential compute workloads deployed as bare-metal containers, virtual machines and containers running in virtual machines using Intel’s trusted execution environment (TEE). The initial release will be released in the second half of 2022. 

Intel’s creation of an independent trust authority has the potential to ensure the security of third-party services and give enterprises more confidence in the supply chain

Bringing trust to the supply chain 

As software supply chain attacks have increased, high-profile security incidents like the SolarWinds, Kaseya and Codecov data breaches have shaken enterprises’ confidence in the security practices of third-party service providers. 

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.

Register Now

While entities like cloud service providers use confidential computing and can attest to the integrity of their security measures, some organizations need greater assurances before they can start to trust them completely. 

“Most cloud service providers (CSPs) today provide the compute infrastructure to run confidential compute workloads and self-attest to those workloads’ trustworthiness,” said Nikhil Deshpande, senior director of Project Amber. 

“Our customers have expressed interest in a trusted third-party assurance service and this new implementation of a trust authority will help ensure higher confidence in moving sensitive data to the cloud.”  

“A recent study with Ponemon Institute found that 58% of organizations say all (34%) or most (24%) access points in their organization’s IT infrastructure are authenticated, pointing to a growing need for attestation implementations like Project Amber. The implementation like trust authority can provide businesses with higher customer confidence when moving sensitive workloads and data to the cloud. Not to mention, delivering consistent trust assurance for multicloud deployments.” Deshpande said.

The confidential computing market today 

The announcement comes as researchers expect the confidential computing market to reach a value of $54 billion by 2026, growing at a compound annual growth rate of 90-95% as organizations attempt to prevent threat actors from accessing or tampering with applications and data. 

Confidential computing is currently being used by a range of providers (and public cloud providers) to protect data in use. For instance, Google Cloud, which recently announced it had generated $5.5 billion in fourth-quarter revenue in 2021, offers users Confidential VMs and Confidential GKE Nodes to encrypt data-in-use. 

Similarly, Microsoft Azure encrypts data in memory in hardware-based TEE, only running applications in the cloud after it verifies the environment to prevent unauthorized access by cloud providers, administrators and users. Microsoft recently announced raising $51.7 billion in annual revenue

However, the key difference between these providers and Intel’s solution, is that Project Amber is cloud-agnostic and designed to stand as a third-party solution to verify and provide an attestation for assets managed by other providers. 

The reason for this approach is that verifying assets by a third-party offers enterprises a more objective approach to measuring risk than relying on a cloud service provider to testify to the security of their systems.  

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.