IBM Cloud Docs
About attestation with Intel SGX or TDX for Virtual Servers for VPC

About attestation with Intel SGX or TDX for Virtual Servers for VPC

Select availability

Attestation is a validation process that that makes sure that a runtime environment is instantiated in an encrypted SGX or TDX enclave on a system with a known security configuration. Data Center Attestation Primitives (DCAP) from Intel facilitates Attestation.

Confidential computing profiles are available in the Dallas (us-south), Washington DC (us-east), and Frankfurt (eu-de) regions. Confidential computing with Intel SGX for VPC is Dallas (us-south), Washington DC (us-east), and Frankfurt (eu-de). Confidential computing with Intel TDX for VPC is available only in the Washington DC (us-east) region. If you want to create a virtual server instance with a confidential computing profile and TDX, you can create that virtual server instance only in the Washington DC (us-east) region. You can’t create a virtual server instance with TDX in any other region, including Dallas (us-south) and Frankfurt (eu-de). For more information, see Confidential computing known issues. Confidential computing is only available with select profiles. For more information, see Confidential computing profiles.

Intel SGX helps protect data that is in use through application isolation technology. Intel TDX helps protect data that is in use through virtual machine isolation technology. By using these features, developers can protect the integrity and confidentiality of their code and data.

Enabling attestation for SGX

The PCK certificate is available in the SGX virtual server, so you don't need to procure it from a PCCS service. This certificate is at /root/.dcap-qcnl/*.

Install DCAP and QCNL packages as specified by Intel.

Install DCAP version 1.19 or greater since previous versions do not support locally cached certificates.

Reconfigure AESM to use the locally cached PCK certificate and restart the service as shown in the following example.

 Configure  /etc/sgx_default_qcnl.conf
 "use_secure_cert": false
 "local_cache_only": true

 and restart aesmd

 systemctl restart aesmd

A non-root user must copy the /root/.dcap-qcnl/* directory to their $HOME directory to use DCAP.

Enabling attestation for TDX

To enable attestation for TDX, follow the Intel instructions Trust Domain at Runtime.

SGX and TDX documentation from Intel

For more information about SGX and TDX, see the following links.

SGX

TDX