Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Complete section "1.9 Operators of TEEs" #25

Open
eriktaubeneck opened this issue Oct 21, 2022 · 2 comments
Open

Complete section "1.9 Operators of TEEs" #25

eriktaubeneck opened this issue Oct 21, 2022 · 2 comments

Comments

@eriktaubeneck
Copy link
Collaborator

I wasn't quite sure how to approach this (and I'm unsure if the text immediately above is appropriate.) I'm not sure if we should write this out assuming the operator can actually see inside the TEE, and then call out the hardware as a mitigation? Any suggestions here would certainly be appreciated! (cc @martinthomson @marianapr @palenica)

Originally posted by @eriktaubeneck in #14 (comment)

@eriktaubeneck
Copy link
Collaborator Author

I think that we want to be direct about the threat model that a TEE is developed under. That is, physical access to the hardware might, with some non-trivial effort, be used to access the active state, which would otherwise be protected.

And we have to consider that the operator has physical access. This is precisely why some of us find use of a TEE uncomfortable/unacceptable.

I don't think we win by prevaricating on this point. We win by acknowledging it and tackling it head-on. That means strict requirements on operational practices by TEE operators, audits, and other such non-technical measures.

Originally posted by @martinthomson in #14 (comment)

@eriktaubeneck
Copy link
Collaborator Author

I've opened this issue, as I'd like to get more input from others. TEEs have multiple different configurations which have different models, and I'm not an expert across them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant