Confidential IT is transforming online security

0

With social distancing Remote work It fundamentally changed the way we live and work. As a result, our online exchanges and interactions are becoming more and more important, complex and frequent. However, many of the measures taken to protect digital exchanges have been developed for a world with far fewer connections. In many cases, we still only hand over the individual The data We verify our transaction and hope it will not be processed incorrectly.

About the Author

Stefan Liesche is the lead architect for the following Cloud Hyper Protect services: IBM..

But that trust is being lost. More digital transactions, more information cloud, Increases the risk of data theft and fraud. Rising media coverage of digital hijacking exacerbates growing distrust of the current generation of digital locks. Basically, yesterday’s locks and chains can’t completely protect operations in a world built around complex cloud connections. They just don’t work.

Luckily new security An innovation called confidential computing has the potential to solve these problems and do more.

What is confidential computing?

so far encryption This was only possible if the data was stored (in storage) or in transit (moved over a network connection). Confidential Computing eliminates remaining security vulnerabilities by protecting the data used by executing code in a hardware-based Secure Execution Environment (TEE). It uses a built-in encryption key and is completely inaccessible from the outside. This new technology can also allow two parties to manipulate data without having access to the information of the other party.

If an attacker breaks into your system and extracts the stored data, the information is useless unless you can decrypt it, for example using a decryption key. Data is safe unless the key is secured and observed from the outside. Therefore, IBM Cloud Hyper Protect Services supports the Keep Your Own Key (KYOK) feature, allowing data owners to maintain independent control of the key and control access to data in the cloud. No one else can access the key, even the cloud provider.

Why is confidential computing so important?

Digital security is nothing new. Protecting Internet communications with HTTPS is well established, as is the use of SSL and TLS. These were initially applied to credit card transactions, but have since become widespread. Confidential computing has the potential to become so popular, thanks to the proliferation of cloud technology and the speed of innovation.

Sharing data through the cloud opens the door to attacks. Processing data in a cloud environment adds a new level of risk. Confidential computing directly addresses these concerns by providing users with the security they need when performing online interactions and transactions. No wonder, then, that there is growing interest in confidential computing, especially among business users.

How to apply confidential computing?

Confidential computer technology can be used to mitigate or prevent cyber attacks such as taking the Petro Rabigh petrochemical plant in Saudi Arabia offline. This is because it can prevent malicious code from accessing operational data. However, this technology has many additional benefits that go beyond mere protection. He plays a clear role in the management of various business relationships.

For example, by ensuring that your data is processed in a protected IT environment, you can collaborate securely with your partners without compromising your IP or disclosing your proprietary information. Confidential IT allows different organizations to consolidate sets of data for analysis without viewing each other’s information. For example, a company can publish data on another company’s own tools without sharing what it wants to keep secret, such as commercially sensitive intellectual property.

What is the future of confidential computing?

One obvious area of ​​use for confidential computing is in healthcare due to the confidentiality of a lot of data and the complex web of relationships between patients, healthcare providers and healthcare managers.

However, the app goes beyond managing personal health data and details of individual treatment plans. It is also applied to drug development, enabling safe cooperation between several pharmaceutical companies without damaging the intellectual property of each participant.

These techniques can be deployed in M&A where law firms need to process and arbitrate sensitive transaction information. Banks and retailers can also cross-check transaction records to identify potential fraud without allowing either party to access commercially sensitive data.

Confidential computing can also offer new types of services. For example, France-based Irene Energy operates an energy package in sub-Saharan Africa, where people can share a single electricity supply, but only charge for the energy they use. This “energy roaming” is based on the use of digital portfolios which have been validated by sensitive IT.

Other applications are more routine, but less important. Bank security checks can be a two-way street. Customers can use secure business transactions already provided by the company to verify that the caller is who they claim to be, using a reliable automated mediation process based on sensitive computing. Like Privakey.

Data sharing without compromise

In a world increasingly operational on digital platforms, the level of data security provided by sensitive computing is more important than ever. Its core capabilities have the potential to transform various sectors such as healthcare, financial services, government and crime.

However, to maximize these benefits, with all kinds of sensitive IT tools and proven technology providers having the ability to deploy them effectively and efficiently and integrate them into existing tools. It is important to associate. Informatique infrastructure..


Source link

Leave A Reply

Your email address will not be published.