Loading...

Microsoft’s emphasis on driving attestation standards and fostering trust in Azure Attestation

Microsoft’s emphasis on driving attestation standards and fostering trust in Azure Attestation

Microsoft Azure Attestation empowers Azure confidential computing (ACC) customers to ensure security and integrity of their sensitive workloads, providing them with unparalleled protection and peace of mind. We firmly believe that giving customers the ability to establish outright trust with our services is a vital aspect of providing security assurances. Further, customers are also seeking a seamless and interoperable experience for attesting trusted execution environments (TEEs) across clouds. To offer this experience, attestation standardization is crucial.  


Therefore, advancing attestation standards and ensuring customers’ trust are paramount to Microsoft. In this article, we will discuss our progress and future plans for achieving these objectives.

 

Microsoft’s efforts to promote attestation standardization

Standardization in the attestation space would greatly facilitate flexibility for customers, as they would be able to switch between different attestation solutions to suit their specific needs. Standardizing attestation result format is important for facilitating interoperability, and we are currently placing a high priority on this initiative. In pursuit of this goal, Microsoft is actively contributing to discussions in the IETF Remote Attestation procedureS (RATS) and Trusted Execution Environment Provisioning (TEEP) working groups. Microsoft holds position as a document editor for the RATS architecture, TEEP architecture, HTTP transport for TEEP and TEEP protocol specifications. Microsoft is also co-chairing the Attestation SIG in Confidential Computing Consortium (CCC), to promote contributions to open-sourced attestation solutions and achieve interoperability.

 

In addition to promoting attestation standards, we are also committed to incorporating standards within Azure Attestation. Attestation token generated by Azure Attestation adheres to the IETF Entity Attestation Token (EAT) format. The token includes claims defined in the IETF EAT draft and JWT specifications. To stay current with evolving standards, we will continuously monitor and aim to implement any new standardized claims within the attestation token.

 

We welcome the opportunity to collaborate on the unification of EAT aligned attestation token formats with any current or future attestation solutions. If you are interested, please initiate a request for collaboration here

 

Establishing trust in Azure Attestation

Azure Attestation protects customers’ data in-use by running its critical operations inside an Intel® Software Guard Extensions (Intel® SGX) enclave. Critical operations of the service like quote validation, token generation, policy evaluation and token signing are performed in an enclave to ensure that Microsoft cannot interfere in the attestation process. Therefore, establishing trust with the service includes steps to validate its implementation within an enclave. Today, Azure Attestation customers are enabled to perform the steps outlined below:

 

1. Verify integrity of the attestation token generated by the service
2. Confirm SGX implementation of the service
3. Validate binding of the attestation token with SGX implementation of the service
4. Confirm if the attestation token originates from the legitimate Azure Attestation, based on the service code measurements

 

To learn more and refer code samples, see Azure Attestation documentation. If you require additional measures to ensure trust in our service, please submit a support ticket here.

 

Future roadmap

Our ultimate goal is to empower Azure customers with unconditional real-time trust in confidential computing services like Azure Attestation. We will strive to offer new options to cater to your transparency requirements and publish blogs to boost trust in Azure Attestation. To reach a definitive outcome in regard to attestation standards, we are committed to continuously making valuable contributions to the attestation industry.

Published on:

Learn more
Azure Confidential Computing Blog articles
Azure Confidential Computing Blog articles

Azure Confidential Computing Blog articles

Share post:

Related posts

AI Builder – Use your own generative AI model from Azure AI Foundry in Prompt builder in Copilot Studio

We are announcing the ability to use your own generative AI model from Azure AI Foundry in prompt builder. This feature has reached general av...

2 hours ago

Azure SDK Release (August 2025)

Azure SDK releases every month. In this post, you'll find this month's highlights and release notes. The post Azure SDK Release (August 2025) ...

21 hours ago

Azure Developer CLI (azd) – August 2025

This post announces the August release of the Azure Developer CLI (`azd`). The post Azure Developer CLI (azd) – August 2025 appeared fir...

1 day ago

Azurite: Build Azure Queues and Functions Locally with C#

Lets say you are a beginner Microsoft Azure developer and you want to : Normally, these tasks require an Azure Subscription. But what if I tol...

4 days ago

Data encryption with customer-managed key (CMK) for Azure Cosmos DB for MongoDB vCore

Built-in security for every configuration Azure Cosmos DB for MongoDB vCore is designed with security as a foundational principle. Regardless ...

6 days ago

Azure Developer CLI: From Dev to Prod with Azure DevOps Pipelines

Building on our previous post about implementing dev-to-prod promotion with GitHub Actions, this follow-up demonstrates the same “build ...

6 days ago

Azure DevOps OAuth Client Secrets Now Shown Only Once

We’re making an important change to how Azure DevOps displays OAuth client secrets to align with industry best practices and improve our overa...

7 days ago

Azure Managed Instance for Apache Cassandra v5.0 Generally Available!

Azure Managed Instance for Apache Cassandra Upgrade to Cassandra v5.0 is now generally available, bringing a host of powerful new features and...

7 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy