Secure Enclaves
A security mechanism that executes code in a hardware-based trusted execution environment (TEE), secure enclaves are an emerging approach to data privacy. On this page we explore the technology in depth.
A security mechanism that executes code in a hardware-based trusted execution environment (TEE), secure enclaves are an emerging approach to data privacy. On this page we explore the technology in depth.
It has become a common practice to process large volumes of sensitive data to unlock groundbreaking insights and train valuable artificial intelligence systems. This requires securing both the data and the often-proprietary algorithms used to process it. Organizations are in a race against malicious actors when it comes to protecting sensitive information by using the latest techniques and technology.
On top of protecting data, organizations also need to protect their networks and novel algorithms. Security measures need to go beyond on-premises assets, to include any operations based in the cloud. Companies also need to approach third-party collaborations with caution, as well as follow all applicable regulations.
One emerging approach to keeping data and algorithms secure is through the use of secure enclaves. A secure enclave refers to hardware-level protection that isolates sensitive assets from other users or programs running on the same machine or cloud server. This is typically accomplished by coding security-related instructions into a separate secure enclave processor that handles the sensitive data and performs the processing. A secure enclave is capable of receiving data that has been encrypted for secure sharing and decrypting it on the fly. With data inside the enclave, it is able to be decrypted and at that point any operation can be run on it (e.g.- find the average).
Using a completely isolated memory and hard-coded decryption keys, a secure enclave does not allow the host to access it during typical processing. This approach is designed to be secure even if the operating system or root user is compromised.
Some secure enclave systems offer an additional layer of security by using a process called attestation. This process confirms that a CPU targeted for data processing is a genuine secure enclave and the processing application hasn’t been corrupted.
Big Tech’s Secure Enclave Security Options
Secure enclaves are a popular technology, and two of the biggest tech companies on the planet — Apple and Intel/AMD — offer hardware implementations for secure enclaves.
The Apple system uses physical separation between the main CPU and a secondary processor located in a different section on the motherboard. The Intel/AMD system uses extended CPU coding and trusted hardware to host both the data and the processing software. Both approaches are designed to protect both the data and computation. Each system is focused on different development types, speeds, scalabilities, and security needs.
Limitations of Secure Enclaves
Secure enclaves security is effective at minimizing the risk of intentional or unintentional data breaches. However, there are also concerns about vulnerabilities, data access, and logistics.
One of the most concerning issues with using secure enclaves is that identified hardware vulnerabilities can take years to patch, and in some cases, the hardware may not be patchable at all, unlike software which can be updated in near real-time over the internet. Recently, security researchers identified a major vulnerability in Apple’s secure enclave processor that they determined to be unpatchable. The vulnerability was related to a memory controller that manages the scope of the secure enclave’s memory use. According to reports, an attacker could exploit this memory-related vulnerability to acquire data that would otherwise only be accessed by the secure enclave.
Secure enclaves also do not enable digital rights on the data. A trusted data partner could still access raw data, possibly using it for unauthorized purposes. For instance, if a research lab wants to provide patient data to a pharmaceutical company, it must negotiate an agreement and trust adherence to terms; which adds significant logistical overhead to data sharing and access.
In addition to security vulnerabilities, secure enclaves do not address some privacy concerns and regulations. Organizations looking to remain compliant with regulations like the General Data Protection Regulation (GDPR) in Europe and the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. must take significant extra measures to ensure compliance. For example, if a research clinic wants to share sensitive data with a drug maker using a secure enclave system, the clinic first has to remove personally identifying information, anonymize the data, agree to legal terms and take other compliance-related steps. Secure enclaves do not reduce the burdensome tasks involved in preparing data for transmission and consumption.
There are also logistical concerns related to the use of secure enclaves. This approach to data security requires data to be compiled in one place before processing. Furthermore, both the processing algorithm and the data must be located on the same server. This scenario raises data residency issues and complicates the processing of European data by U.S.-based organizations. Finally, secure enclaves can be challenging to use for teams that do not have an API ready for data science applications.
A More Comprehensive Approach
While secure enclaves provide a significant degree of privacy and security, additional measures can make for a more comprehensive approach.
The TripleBlind Solution can address many of the limitations associated with secure enclaves, such as:
Now, consider the following benefits of TripleBlind:
If you would like to learn more about our comprehensive approach to data privacy, please contact us today to schedule a demo.
TripleBlind is built on novel, patented breakthroughs in mathematics and cryptography, unlike other approaches built on top of open source technology. The technology keeps both data and algorithms in use private and fully computable.
We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy