What is a Trusted Execution Environment?
A Trusted Execution Environment (TEE) is a secure area of a processor that guarantees code and data loaded inside it are protected with respect to confidentiality and integrity. TEEs provide hardware-level isolation that ensures even privileged software (like the operating system or hypervisor) cannot access or tamper with the protected workload.Key Properties
TEEs provide three fundamental security guarantees:- Confidentiality: Data processed inside the TEE is encrypted and inaccessible to external observers
- Integrity: Code execution cannot be tampered with or modified by unauthorized parties
- Attestation: Remote parties can cryptographically verify what code is running inside the TEE
Confidential Computing Principles
Confidential computing extends traditional security models by protecting data during computation, not just at rest or in transit:Hardware-Based Security
Unlike software-based isolation, TEEs leverage hardware features to enforce security boundaries:- Memory Encryption: All TEE memory is encrypted with processor-managed keys
- Attestation Quotes: Hardware-signed evidence of the TEE’s state
- Secure Key Provisioning: Keys derived from hardware root of trust
- Side-Channel Resistance: Protection against timing and cache attacks
TEE security does not depend on trusting the cloud provider, operating system, or virtualization layer.
Phala Cloud CVM Deployment
Umbra runs on Phala Cloud using Confidential Virtual Machines (CVMs) powered by Intel TDX (Trust Domain Extensions). The deployment architecture consists of:Service Components
- Services can communicate over localhost without leaving the TEE
- Network traffic entering/exiting the TEE is protected by TLS with EKM channel binding
- The entire stack is measured and verifiable through attestation
Security Architecture
Why TEEs for AI Workloads
AI inference on sensitive data presents unique security challenges:1. Data Confidentiality
AI models process highly sensitive inputs:- Medical records
- Financial documents
- Legal contracts
- Personal communications
- Cloud provider access
- Co-tenant attacks
- Compromised hypervisors
- Memory dumps and forensics
2. Model Protection
Proprietary AI models are valuable intellectual property. TEEs can protect:- Model weights and architectures
- Fine-tuning data
- Inference optimizations
3. Regulatory Compliance
Many regulations require demonstrable security controls:- HIPAA: Protected Health Information (PHI) must be encrypted during processing
- GDPR: Data processing requires appropriate technical measures
- CCPA: Consumer data must be secured against unauthorized access
4. Zero-Trust Architecture
Traditional cloud deployments require trusting the provider. TEEs enable:- Client-side verification: Users verify the TEE state before sending data
- No server trust: Provider cannot access data even with root access
- Verifiable code: Attestation proves exactly what code is running
5. Multi-Party Computation
TEEs enable scenarios where multiple parties need to collaborate without trusting each other:- Combining datasets from competing organizations
- Regulatory auditing without exposing raw data
- Privacy-preserving analytics
Security Limitations
While TEEs provide strong security guarantees, they have limitations:Verification Process
Umbra implements a complete attestation flow:- Client initiates connection: Browser connects via aTLS proxy
- TLS handshake: Client and TEE establish encrypted channel
- Quote generation: Attestation service generates TDX quote with nonce + EKM
- Client-side verification: Browser verifies quote using Intel DCAP
- Policy validation: Client checks measurements against expected values
- Trusted communication: If verification succeeds, client sends sensitive data
Next Steps
TDX Attestation
Deep dive into Intel TDX quotes and DCAP verification
EKM Channel Binding
Learn how TLS sessions are cryptographically bound to attestations
RA-TLS (aTLS)
Explore the Remote Attestation TLS implementation
Deployment Guide
Deploy your own TEE-backed AI service
