How to protect your applications on public and private clouds using Fortanix Runtime Encryption®

nehal bandi fortanix
Nehal Bandi
Published:Dec 13, 2018
Reading Time:3 Minutes

In this blog we will describe common application threats and how Fortanix Runtime Encryption® protects application assets from these threats on untrusted platforms including public cloud.

We will use a 3-tiered application as an example with Nginx as the front-end load balancer tier, Python Flask as the application server tier and MariaDB as the data tier.

front end load balancer in secure enclave

An application comes under attack from various threats that target different assets. Each threat actor can use any vulnerability in your application or the underlying platform to get to the target asset.

For example, a malicious insider can use operating system vulnerability to obtain access to your application’s cryptographic keys. In the table below, we describe different threat actors, assets and vulnerabilities that you should consider for your application deployments.

Actors Assets Vulnerabilities
  • Malicious insider
  • Naïve insider
  • Malicious cloud provider
  • External attacker
  • Network intruder
  • Host intruder
  • Application integrity
  • Application logs
  • Application secrets
  • Data in motion
  • Data at rest
  • Data in use
  • Data integrity
  • Access control
  • System software vulnerability
  • Social engineering
  • Password leakage
  • Source level compromise
  • Software side channel
  • OS bugs
  • S/W Trojan
  • H/W Trojan
  • Shared platform vulnerability

Fortanix Runtime Encryption® provides unprecedented application protection by keeping application memory encrypted throughout the application life cycle using Intel® SGX technology.

With Intel® SGX the operating system, virtual memory manager and other lower layer software and hardware components are outside the trust boundary. Application assets are protected even in the presence of platform vulnerabilities and administrator privilege compromises.

Front Tier: Protect the gate

For a tiered application, an application front-end tier like Nginx serves as a gate keeper and controls input traffic. Many application deployments use the front-end tier for transport layer security (TLS) termination. The TLS keys, user sessions parameters and access controls are some of the critical assets protected by Runtime Encryption®.

front end load balancer in secure enclave

Protected by Fortanix Runtime Encryption®
  • TLS keys of load balancer
  • Data Tampering
  • Data leakage/Exfiltration (user inputs)
  • Logs of load balancer
  • Access control bypass (bypassing the proxy)
  • Proxy redirection to unauthorized host

App Tier: Protect business secrets

Application servers like Python Flask in our example runs the business logic. Some of the critical assets managed by this tier are trade secrets, database access keys and application logs.

business logic in application servers

Protected by Fortanix Runtime Encryption®
  • TLS keys and Application secrets (Database password or client TLS key)
  • Application code confidentiality
  • Application data confidentiality (Data in use)
  • Application logs
  • Application access control
  • Database access

Data Tier: Protecting data-in-use and data-at-rest

Runtime Encryption® protects the data tier by keeping data encrypted in memory and on the disk. Fortanix can keep the database in encrypted storage that is tied to the application signature and application signer identity.

database in encrypted storage

Protected by Fortanix Runtime Encryption®
  • Data at rest encryption
  • Data in memory encryption
  • Database server Integrity
  • Data Integrity
  • TLS keys or Database secrets
  • Database logs
  • Database access control

Using Runtime Encryption® does not require any application changes or recompilation. Fortanix can convert existing application containers into Intel® SGX capable secured containers to facilitate undisrupted continuous integration and deployment pipelines.

The secured containers are on integrity-protected and encrypted storage, thus removing the possibility of tempering with application binaries and configuration. The application integrity and confidentiality are enforced by Intel® SGX remote attestation at the application launch.

Fortanix Runtime Encryption® is available on the IBM public cloud and can be deployed on-premises with existing container management platforms such as Kubernetes and OpenShift.

Share this post:
Fortanix-logo

4.6

star-ratingsgartner-logo

As of August 2023

SOC-2 Type-2ISO 27001FIPSGartner LogoPCI DSS Compliant

US

Europe

India

Singapore

3910 Freedom Circle, Suite 104,
Santa Clara CA 95054

+1 408-214 - 4760|info@fortanix.com

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712