Learning Library

← Back to Library

IBM Hyper Protect Confidential Computing Explained

Key Points

  • Confidential Computing is essential because data security, privacy, and regulatory concerns—especially fears of cloud providers having back‑door access— deter 95% of regulated‑industry customers from moving sensitive workloads to public clouds.
  • IBM’s Hyper Protect Services address all three pillars of data protection—data at rest, data in flight, and data in use (in‑memory)—by delivering end‑to‑end confidential computing without sacrificing performance or latency.
  • The platform runs on dedicated LinuxONE hardware using Secure Service Containers, which create a protected boundary that prevents unauthorized access by administrators or cloud operators and includes tamper‑proof self‑attestation of software images.
  • Hyper Protect’s suite (Crypto Services, Virtual Servers, DBaaS) is already leveraged by financial institutions, automotive manufacturers, and startups to meet stringent security requirements.
  • A highlighted use case is a Digital Assets Platform that tokenizes and trades diverse assets, combining blockchain ledger technology, secure wallets for key protection, and confidential computing to safeguard the entire transaction workflow.

Full Transcript

# IBM Hyper Protect Confidential Computing Explained **Source:** [https://www.youtube.com/watch?v=o28kWyxoiV8](https://www.youtube.com/watch?v=o28kWyxoiV8) **Duration:** 00:05:50 ## Summary - Confidential Computing is essential because data security, privacy, and regulatory concerns—especially fears of cloud providers having back‑door access— deter 95% of regulated‑industry customers from moving sensitive workloads to public clouds. - IBM’s Hyper Protect Services address all three pillars of data protection—data at rest, data in flight, and data in use (in‑memory)—by delivering end‑to‑end confidential computing without sacrificing performance or latency. - The platform runs on dedicated LinuxONE hardware using Secure Service Containers, which create a protected boundary that prevents unauthorized access by administrators or cloud operators and includes tamper‑proof self‑attestation of software images. - Hyper Protect’s suite (Crypto Services, Virtual Servers, DBaaS) is already leveraged by financial institutions, automotive manufacturers, and startups to meet stringent security requirements. - A highlighted use case is a Digital Assets Platform that tokenizes and trades diverse assets, combining blockchain ledger technology, secure wallets for key protection, and confidential computing to safeguard the entire transaction workflow. ## Sections - [00:00:00](https://www.youtube.com/watch?v=o28kWyxoiV8&t=0s) **IBM Hyper Protect Confidential Computing Overview** - Vivek Kinra explains how IBM Cloud Hyper Protect Services address the three pillars of data security—including data at rest, in flight, and in use—by delivering end‑to‑end confidential computing for regulated industries. - [00:03:08](https://www.youtube.com/watch?v=o28kWyxoiV8&t=188s) **Secure Digital Asset Platform Architecture** - The segment explains how IBM’s digital‑assets platform safeguards non‑equity assets—coins, commodities, etc.—using blockchain ledgers, wallet protection, encrypted exchanges, Hyper Protect Virtual Servers, HSM‑based key management, and cold‑storage/backup integration to block unauthorized access. ## Full Transcript
0:00Hi, I'm Vivek Kinra from the IBM  Cloud Hyper Protect Services team. 0:04Today, we're going to talk about Confidential  Computing as provided by Hyper Protect. 0:10So, why Confidential Computing? Data security and protection are by far 0:15the biggest inhibitors for organizations  seeking to move sensitive applications 0:20and data to the public cloud.  In fact, 95% of our customers 0:26in regulated industry cited security, privacy,  regulatory concerns and cloud provider having a 0:33backdoor access to organizations sensitive data as  their main inhibitors for using a public cloud. 0:40To address these concerns, we are talking  about three pillars of data security 0:45when considering end-to-end data protection. Data at rest and data in flight are the two 0:52pillars that historically have received the  most attention and addresses many concerns. 0:59However, when regulated industries clients  bring their sensitive workloads to the IBM Cloud 1:05Hyper Protect Services, they want  to process their sensitive data with 1:10highest level of data protection without  compromising the performance and latency. 1:17So, to complete the data protection  lifecycle, client wants to protect 1:21their data when it in use, or in memory. This is the focus of confidential computing. 1:27The IBM Cloud Hyper Protect Services, including  Crypto Services, Virtual Servers and DBaaS offer 1:35protection for all 3 pillars thereby providing  an end-to-end confidential computing environment 1:41in the IBM Cloud. So, how does IBM 1:43provide this level of security? Well, the Hyper Protect Services leverage 1:49many years of IBM's security and privacy experience to the Cloud. 1:54To do this, we deploy our services on special LinuxONE hardware that utilizes 2:00what's known as a Secure Service Container. This is a protective boundary around the base 2:06operating system, management backend  and application interface to ensure no 2:12access by the unauthorized figures like system  administrators or the cloud providers. 2:18Secure Service Container ensures:  Data Integrity and self-attestation - There 2:25is  tamper protection and verification through  signatures that the packaged software image is 2:30deployed from a trusted source and not  been modified since leaving the vendor. 2:36In case any tamper is detected,  Secure Service Container will not boot that image. 2:42There are several examples of client  segments from financial institutes, 2:46automotive manufacturers to start-ups who are  currently using the Hyper Protect Services 2:52to achieve confidential computing. Today, we're going to explore one particular 2:58use case, the Digital Assets Platform. With this use case, clients are tokenizing 3:04and trading assets, similarly to  how the stock market works. 3:08However, the assets aren't shares of a company,  they can range from coins to commodities. 3:15With our digital assets platform,  you have the asset itself, 3:19that is run by a combination of 3 things. 3:22A base technology, Blockchain,  that provides the ledger. 3:27The Wallets, to protect keys. And Exchanges, or the digital marketplace. 3:32To provide a confidential computing environment  for the Digital Assets Platform, first, 3:38we utilize protected runtimes with Hyper Protect  Virtual Servers to actually run the application. 3:44These run within a Secure Service Container that  automatically encrypts data and provides memory 3:50protection to ensure that no unauthorized  person gets access to secure data. 3:56Next, we work with the Hyper Protect Crypto  Services to utilize the Hardware Security Module, 4:02or HSM, and Key Management Service. With this technology, built on FIPS 140-2 Level 4 4:09certified hardware, clients can  lock down their storage, backups, 4:14Secure Service Container, and applications. Finally, we work with other IBM Cloud offerings 4:20to provide backup and storage, also integrated  with Crypto Services, and holistically 4:26locking down the entire environment. In this way, we protect from 4:30malicious actors in several ways. They cannot SSH into the boundary, the wallets and 4:36ledgers are stored in Cold Storage, or offline,  with encrypted communications, and the Secure 4:42Service Container is tamper-proof and will prevent  unauthorized access through these back doors. 4:49So, with that example in mind, there  are 2 reasons to choose Hyper Protect 4:53for Confidential Computing: First, clients maintain complete authority 4:58over their workloads. They have exclusive  control of who sees the data, what happens 5:04to that data and how that data is processed. Second, client data and applications are 5:10protected from both insider and outsider  threats. There is technical assurance, 5:16not just operational assurance. We go beyond the confidential computing 5:20environment to protect data at all stages, in  flight, at-rest, and in-use, plus the complete 5:28authority that only comes with IBM Cloud. With that, thank you for listening to this 5:34brief overview of IBM Cloud Hyper  Protect Services and their role 5:38in the confidential computing environment. Do not forget to check us out at the links below.