Intel Intros Project Amber for Trust Assurance
May 12, 2022
During Day 2 of its inaugural Intel Vision event, Intel turned its focus to how it will meet the growing security needs of organizations today and help them prepare for the challenges of tomorrow. Focusing on one of the most critical security elements for any organization – trust – Intel introduced an independent trust authority in the form of an innovative service-based security implementation code-named Project Amber. The company also demonstrated its focus on enabling secure and responsible AI, and outlined its strategy to further build quantum-resistant cryptography for the coming quantum computing era.
Provides customers and partners a security foundation for confidential computing, secure and responsible AI, and quantum-resistant crypto into the quantum era.
“As organizations continue to capitalize on the value of the cloud,
security has never been more top of mind. Trust goes hand in hand with security,
and it is what our customers expect and require when delivering on Intel
technology,” said Greg Lavender, chief technology officer, senior vice president
and general manager of the Software and Advanced Technology Group at Intel.
“With the introduction of Project Amber, Intel is taking confidential computing
to the next level in our commitment to a zero-trust approach to attestation and
the verification of compute assets at the network, edge and in the cloud.”
Designed to be cloud-agnostic, this service will support confidential computing workloads in the public cloud, within private/hybrid cloud and at the edge. Interposing a third party to provide attestation helps provide objectivity and independence to enhance confidential computing assurance to users.
In its first version, Project Amber intends to support confidential compute workloads deployed as bare metal containers, virtual machines (VMs) and containers running in virtual machines using Intel TEEs. The initial release will support Intel TEEs, with plans to extend coverage to platforms, devices and other TEEs in the future.
Intel is also working with independent software vendors (ISVs) to enable trust services that include Project Amber. New software tools, such as published APIs that enable ISVs to incorporate Project Amber to augment software and services, will complement Intel’s platforms and technologies, and bring more value to customers and partners.
Intel plans to launch a customer pilot of Project Amber in the
second half of 2022, followed by general availability in the first half of 2023.
BeeKeeper AI uses Intel SGX hardware-based security capabilities and Microsoft Azure’s confidential computing infrastructure to provide a zero-trust platform. It enables an AI algorithm to compute against multiple real-world clinical datasets without compromising the privacy of the data or the intellectual property of the algorithm model. This is accelerating healthcare AI development and deployment innovation by more than 30% to 40% when compared to the current method.
Intel’s research partnership with the University of Pennsylvania, Perelman School of Medicine’s Federated Tumor Segmentation, or FeTS initiative, uses a set of Intel hardware and open-source software technologies to improve the training of AI models to locate brain tumors. Intel technology helps ensure each institution can participate in improving the fidelity and quality of the inferencing algorithms by using Open Federated Learning (OpenFL). OpenFL enabled 55 institutions across six continents to collaborate while preserving the security and privacy of their individual datasets. The result is an AI model that improves efforts to locate tumors by 33%.
The responsible use of AI also serves as an example of how the
industry can come together and pave the path for deployment across verticals
that include healthcare, financial services, manufacturing, retail and
entertainment, among others.
Increase robustness of code signing applications such as authentication of firmware and software with quantum-resistant algorithms. This helps guard against attacks that break classical crypto to run malicious code.
Secure the internet with post-quantum crypto algorithms standardized by NIST. This includes key encapsulation and digital signature algorithms fundamental to securing transactions over the web.
Security technologies must accommodate not just the needs of today, but those of tomorrow. Intel’s breadth and depth of hardware and software technologies enable customers to derive additional value from their existing platforms.