{"id":3025,"date":"2019-02-14T10:16:19","date_gmt":"2019-02-14T09:16:19","guid":{"rendered":"https:\/\/talium.fr\/?p=3025"},"modified":"2019-02-14T10:16:19","modified_gmt":"2019-02-14T09:16:19","slug":"protection-donnees-avec-enclave-intel-sgx","status":"publish","type":"post","link":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/","title":{"rendered":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX"},"content":{"rendered":"<h2>Contexte<\/h2>\n<p><span style=\"font-weight: 400;\">Avec l&rsquo;\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le et soumis \u00e0 des r\u00e9glementations qui diff\u00e8rent selon le pays o\u00f9 ils sont localis\u00e9s.<\/span><b> Ces donn\u00e9es potentiellement sensibles doivent \u00eatre prot\u00e9g\u00e9es<\/b><span style=\"font-weight: 400;\"> de sorte qu\u2019aucun individu tiers n\u2019ait la possibilit\u00e9 technique d\u2019y acc\u00e9der.<\/span><br \/>\n<span style=\"font-weight: 400;\">D\u2019autant qu\u2019avec l&rsquo;instauration du <\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/CLOUD_Act\"><span style=\"font-weight: 400;\">CLOUD Act<\/span><\/a> <span style=\"font-weight: 400;\">permettant \u00e0 l\u2019administration US de contraindre les fournisseurs de services am\u00e9ricains \u00e0 fournir toute donn\u00e9e stock\u00e9e sur des <\/span><span style=\"font-weight: 400;\">serveurs<\/span><span style=\"font-weight: 400;\"> situ\u00e9s aux <\/span><span style=\"font-weight: 400;\">\u00c9tats-Unis<\/span> <b>ou non<\/b><span style=\"font-weight: 400;\">, le besoin d\u2019une technologie assurant la confidentialit\u00e9 des donn\u00e9es est urgent. <\/span><br \/>\n<span style=\"font-weight: 400;\">Jusqu\u2019\u00e0 pr\u00e9sent, la majorit\u00e9 des applications couple au mieux deux mani\u00e8res de chiffrer leurs donn\u00e9es :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Transport_Layer_Security\"><b>Protocole TLS<\/b><\/a><span style=\"font-weight: 400;\">\u00a0(<\/span><i><span style=\"font-weight: 400;\">Transport Layer Security <\/span><\/i><span style=\"font-weight: 400;\">)<\/span><i><span style=\"font-weight: 400;\"> \u2013 <\/span><\/i><span style=\"font-weight: 400;\">permet de chiffrer les donn\u00e9es en transit, c-\u00e0-d les communications r\u00e9seau.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Data at Rest Encryption<\/b><span style=\"font-weight: 400;\"> (<\/span><i><span style=\"font-weight: 400;\">chiffrement des donn\u00e9es stock\u00e9es<\/span><\/i><span style=\"font-weight: 400;\">)<\/span><i><span style=\"font-weight: 400;\"> \u2013 <\/span><\/i><span style=\"font-weight: 400;\">permet de chiffrer les donn\u00e9es au repos (ex:\u00a0<\/span><span style=\"font-weight: 400;\">option TDE d\u2019un SGBD-R, syst\u00e8me de fichiers chiffr\u00e9 ou<\/span><i><span style=\"font-weight: 400;\"> full disk encryption)<\/span><\/i><\/li>\n<\/ul>\n<p><figure id=\"attachment_3042\" aria-describedby=\"caption-attachment-3042\" style=\"width: 1400px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3042\" src=\"https:\/\/talium.fr\/wp-content\/uploads\/2019\/02\/before-SGX.png\" alt=\"\" width=\"1400\" height=\"435\" \/><figcaption id=\"caption-attachment-3042\" class=\"wp-caption-text\"><em>Application classique o\u00f9 seules les donn\u00e9es en transit et au repos sont chiffr\u00e9es.<\/em><\/figcaption><\/figure><br \/>\n<span style=\"font-weight: 400;\">Cependant, ces techniques ne prot\u00e8gent que les donn\u00e9es en transit et celles au repos, mais elles\u00a0<\/span><b>ne permettent pas de s\u00e9curiser les donn\u00e9es d&rsquo;ex\u00e9cution <\/b><span style=\"font-weight: 400;\">&#8211;<\/span><i><span style=\"font-weight: 400;\"> donn\u00e9es g\u00e9n\u00e9r\u00e9es par l&rsquo;ex\u00e9cution du programme<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><br \/>\n<span style=\"font-weight: 400;\">En effet, lorsqu\u2019elles sont stock\u00e9es en m\u00e9moire en vue d\u2019un traitement par le microprocesseur, ces donn\u00e9es ne sont plus chiffr\u00e9es, <\/span><b>ouvrant alors une large palette d\u2019attaques potentielles<\/b><span style=\"font-weight: 400;\"> (ex:\u00a0<\/span><span style=\"font-weight: 400;\">malware, administrateur malveillant<\/span><span style=\"font-weight: 400;\">).<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Solution SGX<\/span><\/h2>\n<p><a href=\"https:\/\/software.intel.com\/en-us\/sgx\"><b>Intel SGX<\/b><\/a><span style=\"font-weight: 400;\">\u00a0(<\/span><i><span style=\"font-weight: 400;\">Software Guard Extensions<\/span><\/i><span style=\"font-weight: 400;\">)<\/span><span style=\"font-weight: 400;\">\u00a0est un ensemble d&rsquo;instructions disponible sur de nombreuses architectures de microprocesseurs Intel, permettant \u00e0 l\u2019utilisateur d&rsquo;allouer des r\u00e9gions priv\u00e9es de m\u00e9moire appel\u00e9es <\/span><b>enclaves<\/b><span style=\"font-weight: 400;\">, prot\u00e9g\u00e9es de tout programme ou administrateur pr\u00e9sent sur le syst\u00e8me d\u2019exploitation.<\/span><br \/>\n<b>En d\u2019autres termes, SGX permet d\u2019ex\u00e9cuter une application dans une enclave s\u00e9curis\u00e9e et chiffr\u00e9e gr\u00e2ce \u00e0 un jeu d\u2019instructions sp\u00e9cifiques. <\/b><span style=\"font-weight: 400;\">Comme nous pouvons le voir sur la figure ci-dessous, la surface d\u2019attaque potentielle est r\u00e9duite de mani\u00e8re drastique lors de l&rsquo;utilisation de ces enclaves.<\/span><br \/>\n<figure id=\"attachment_3032\" aria-describedby=\"caption-attachment-3032\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3032 size-full\" src=\"https:\/\/talium.fr\/wp-content\/uploads\/2019\/02\/intel-software-guard-extensions-tutorial-intel-sgx-foundation-fig01.png\" alt=\"\" width=\"700\" height=\"312\" \/><figcaption id=\"caption-attachment-3032\" class=\"wp-caption-text\"><em>Comparatif de la surface d\u2019attaque avec et sans enclaves. Source : <a href=\"https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-tutorial-part-1-foundation\">Software.intel.com<\/a><\/em><\/figcaption><\/figure><\/p>\n<h2><span style=\"font-weight: 400;\">Fortanix<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Plusieurs soci\u00e9t\u00e9s, dont <\/span><b>Fortanix<\/b><span style=\"font-weight: 400;\">, ont impl\u00e9ment\u00e9 des solutions tirant parti des possibilit\u00e9s propos\u00e9es par SGX. En plus de fournir un chiffrement des donn\u00e9es en transit et des donn\u00e9es au repos, <a href=\"https:\/\/fortanix.com\/\"><em>Fortanix Runtime Encryption<\/em><\/a> cr\u00e9e un environnement d\u2019ex\u00e9cution pour les applications leur permettant de fonctionner &#8211; <\/span><b>sans modification<\/b><span style=\"font-weight: 400;\"> &#8211; dans un contexte s\u00e9curis\u00e9, les<\/span> <span style=\"font-weight: 400;\">immunisant ainsi contre de nombreux vecteurs d\u2019attaque. <\/span><br \/>\n<span style=\"font-weight: 400;\">Pour ce faire, l\u2019environnement \u00e9tablit une base de confiance dans le microprocesseur et l\u2019utilise pour <\/span><b>chiffrer l\u2019int\u00e9gralit\u00e9 des fichiers, les appels r\u00e9seau, la m\u00e9moire syst\u00e8me, le cache et autres entr\u00e9es\/sorties de l&rsquo;application en cours d&rsquo;ex\u00e9cution<\/b><span style=\"font-weight: 400;\">, rendant le tout inaccessible \u00e0 tout processus confondu, <\/span><b>quel que soit le niveau de privil\u00e8ge<\/b><span style=\"font-weight: 400;\">. <\/span><br \/>\n<span style=\"font-weight: 400;\">La cl\u00e9 de chiffrement utilis\u00e9e n\u2019est stock\u00e9e dans aucune m\u00e9moire persistante ou vive (<\/span><span style=\"font-weight: 400;\">RAM<\/span><i><span style=\"font-weight: 400;\">).\u00a0<\/span><\/i><span style=\"font-weight: 400;\">Elle est d\u00e9riv\u00e9e par le microprocesseur \u00e0 partir d\u2019un secret provisionn\u00e9 dans le CPU lors de sa cr\u00e9ation par Intel. Cette m\u00e9thode permet au microprocesseur de chiffrer et d\u00e9chiffrer les donn\u00e9es sans recours \u00e0 un software tiers (<\/span><span style=\"font-weight: 400;\">syst\u00e8me d&rsquo;exploitation, SMM, BIOS, etc.<\/span><span style=\"font-weight: 400;\">). <\/span><br \/>\n<figure id=\"attachment_3031\" aria-describedby=\"caption-attachment-3031\" style=\"width: 2048px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3031 size-full\" src=\"https:\/\/talium.fr\/wp-content\/uploads\/2019\/02\/unnamed.png\" alt=\"\" width=\"2048\" height=\"1138\" \/><figcaption id=\"caption-attachment-3031\" class=\"wp-caption-text\"><em>Application : les donn\u00e9es en transit, au repos et d&rsquo;ex\u00e9cution sont chiffr\u00e9es.<\/em><\/figcaption><\/figure><\/p>\n<h2><span style=\"font-weight: 400;\">Applications possibles <\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Les domaines d\u2019applications pouvant avoir recours \u00e0 cette technologie sont nombreux. <\/span><\/p>\n<h3>Stockage de donn\u00e9es dans le cloud<\/h3>\n<p><span style=\"font-weight: 400;\">Plusieurs fournisseurs de service cloud ont activ\u00e9 SGX sur les processeurs de leurs serveurs. Avoir recours \u00e0 SGX permet de traiter de mani\u00e8re plus sereine ses donn\u00e9es sur un <\/span><i><span style=\"font-weight: 400;\">untrusted cloud environment<\/span><\/i><span style=\"font-weight: 400;\">,\u00a0<\/span><span style=\"font-weight: 400;\">sans lui accorder notre confiance,\u00a0<\/span><span style=\"font-weight: 400;\">en s\u2019assurant que le fournisseur lui-m\u00eame ne puisse pas acc\u00e9der aux donn\u00e9es.<\/span><br \/>\n<span style=\"font-weight: 400;\">Parmi les fournisseurs cloud ayant activ\u00e9 SGX \u00e0 ce jour : <\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">IBM<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Alibaba<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cloud&amp;Heat<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Packet.net<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Dans le cas d\u2019IBM, l\u2019ex\u00e9cution des applications dans des enclaves est permise par son offre\u00a0<a href=\"https:\/\/www.ibm.com\/cloud\/data-shield\">IBM Cloud Data Shield<\/a>\u00a0qui int\u00e8gre\u00a0la technologie <em>Runtime Encryption<\/em> de Fortanix.<\/span><br \/>\n<span style=\"font-weight: 400;\">Dans le cadre de son partenariat avec <a href=\"https:\/\/www.ibm.com\/case-studies\/irene-energy-hybrid-cloud-blockchain\">Irene Energy<\/a>, Talium utilise cette technologie IBM Data Shield pour s\u00e9curiser ses wallets <\/span><a href=\"https:\/\/www.stellar.org\/\"><b>Stellar<\/b><\/a><span style=\"font-weight: 400;\">. Dans le contexte de ce projet, il est critique de garantir que les cl\u00e9s priv\u00e9es utilis\u00e9es, notamment pour la signature des transactions op\u00e9rant des micropaiements, ne soient jamais pr\u00e9sentes en clair en m\u00e9moire.<\/span><\/p>\n<h3>Utilisation de SGX dans le contexte blockchain<\/h3>\n<p><span style=\"font-weight: 400;\">Diff\u00e9rents protocoles blockchain permettant la cr\u00e9ation d\u2019applications d\u00e9centralis\u00e9es (dApps) sont compatibles avec SGX.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><a href=\"https:\/\/enigma.co\/\">Enigma<\/a> v1 permet notamment d\u2019utiliser des donn\u00e9es confidentielles dans des Smart Contracts en d\u00e9portant leur ex\u00e9cution dans une enclave. (NB : pour toute question, contacter un Enigma Ambassador. <a href=\"https:\/\/www.linkedin.com\/in\/blockchainer\/\">Exemple<\/a>.)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><a href=\"https:\/\/iex.ec\/\">iExec<\/a> &#8211; protocole de cloud computing d\u00e9centralis\u00e9 &#8211; int\u00e8gre \u00e9galement l&rsquo;utilisation de SGX via Fortanix ou\u00a0<a href=\"https:\/\/sconecontainers.github.io\/\">Scone<\/a> (<\/span><span style=\"font-weight: 400;\">solution alternative<\/span><span style=\"font-weight: 400;\">)<\/span><span style=\"font-weight: 400;\"> afin de prot\u00e9ger les donn\u00e9es des dApps qui sont ex\u00e9cut\u00e9es sur des machines potentiellement \u201cuntrusted\u201d.<\/span><\/li>\n<\/ul>\n<h3>Wallet de cryptomonnaie<\/h3>\n<p><span style=\"font-weight: 400;\">Ces enclaves peuvent permettre la cr\u00e9ation de wallets de cryptomonnaie s\u00e9curis\u00e9s stockant les cl\u00e9s priv\u00e9es dans des enclaves. <\/span><span style=\"font-weight: 400;\">On notera d\u2019ailleurs l\u2019avis concordant du CTO de Ledger Nicolas Bacca, lequel<\/span><span style=\"font-weight: 400;\">\u00a0s\u2019exprimait d\u00e9j\u00e0 \u00e0 ce sujet au micro de Sarah-Diane Eck de Sandblock en septembre 2017 :<\/span><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\"><strong>\u201c je vois bien un futur o\u00f9 ces technologies seront int\u00e9gr\u00e9es (aux t\u00e9l\u00e9phones et ordinateurs personnels) et o\u00f9 Ledger fournira un OS s\u00e9curis\u00e9 pouvant fonctionner sur ces architectures. \u201d<\/strong><br \/>\n<\/span><\/i><i><span style=\"font-weight: 400;\">Source : <\/span><\/i><a href=\"https:\/\/youtu.be\/PeLUIiZLrPc?t=60\"><i><span style=\"font-weight: 400;\">https:\/\/youtu.be\/PeLUIiZLrPc?t=60<\/span><\/i><\/a><\/p>\n<p>Ces technologies et leur utilisabilit\u00e9 ont \u00e9volu\u00e9 depuis et les champs d&rsquo;application pour la confidentialit\u00e9 des donn\u00e9es sont nombreux et exploitables d\u00e8s \u00e0 pr\u00e9sent.<br \/>\n<span style=\"font-weight: 400;\">A noter que la faille li\u00e9e \u00e0 l&rsquo;attaque Foreshadow (L1 Terminal Fault), qui avait \u00e9t\u00e9 m\u00e9diatis\u00e9e d\u00e9but 2018 car elle permettait d\u2019extraire le contenu de m\u00e9moires prot\u00e9g\u00e9es par SGX via une <\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Attaque_par_canal_auxiliaire\"><span style=\"font-weight: 400;\">attaque par canal auxiliaire<\/span><\/a>,<span style=\"font-weight: 400;\">\u00a0fut patch\u00e9e dans la foul\u00e9e.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">La technologie des enclaves SGX est une solution tr\u00e8s prometteuse pour r\u00e9pondre aux besoins de confidentialit\u00e9 forte de donn\u00e9es (wallets, RGPD, AI\/ML sur donn\u00e9es confidentielles, etc.) sans n\u00e9cessiter l&rsquo;ajout de mat\u00e9riel sp\u00e9cifique pour le chiffrement.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contexte Avec l&rsquo;\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le et soumis \u00e0 des r\u00e9glementations qui diff\u00e8rent selon le pays o\u00f9 ils sont localis\u00e9s. Ces donn\u00e9es potentiellement sensibles doivent \u00eatre prot\u00e9g\u00e9es de sorte qu\u2019aucun individu tiers n\u2019ait la possibilit\u00e9 technique d\u2019y acc\u00e9der. D\u2019autant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3035,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ub_ctt_via":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[381],"tags":[],"class_list":["post-3025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr"],"featured_image_src":null,"author_info":{"display_name":"Talium","author_link":"https:\/\/www.talium-assets.com\/fr\/author\/talium\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Am\u00e9liorez la protection de vos donn\u00e9es avec SGX<\/title>\n<meta name=\"description\" content=\"Contexte Avec l&#039;\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX\" \/>\n<meta property=\"og:description\" content=\"Contexte Avec l&#039;\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\" \/>\n<meta property=\"og:site_name\" content=\"Talium-assets\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T09:16:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2022\/03\/Talium-Assets-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Talium\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Talium\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\"},\"author\":{\"name\":\"Talium\",\"@id\":\"https:\/\/www.talium-assets.com\/#\/schema\/person\/3bb5330fcc10a764e42c3dc1cd9fb965\"},\"headline\":\"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX\",\"datePublished\":\"2019-02-14T09:16:19+00:00\",\"dateModified\":\"2019-02-14T09:16:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\"},\"wordCount\":1131,\"publisher\":{\"@id\":\"https:\/\/www.talium-assets.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\",\"url\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\",\"name\":\"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX\",\"isPartOf\":{\"@id\":\"https:\/\/www.talium-assets.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-02-14T09:16:19+00:00\",\"dateModified\":\"2019-02-14T09:16:19+00:00\",\"description\":\"Contexte Avec l'\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le\",\"breadcrumb\":{\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.talium-assets.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talium-assets.com\/#website\",\"url\":\"https:\/\/www.talium-assets.com\/\",\"name\":\"Talium-assets\",\"description\":\"Next level Tokenization Platform\",\"publisher\":{\"@id\":\"https:\/\/www.talium-assets.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talium-assets.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talium-assets.com\/#organization\",\"name\":\"Talium-assets\",\"url\":\"https:\/\/www.talium-assets.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.talium-assets.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2024\/04\/Talium_Assets_Logo.png\",\"contentUrl\":\"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2024\/04\/Talium_Assets_Logo.png\",\"width\":1594,\"height\":548,\"caption\":\"Talium-assets\"},\"image\":{\"@id\":\"https:\/\/www.talium-assets.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/68882684\/admin\/feed\/posts\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talium-assets.com\/#\/schema\/person\/3bb5330fcc10a764e42c3dc1cd9fb965\",\"name\":\"Talium\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.talium-assets.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/147951efae8481bf078a9b1fb9cde0449ef0234f4dde7d565b3773825bdd0ed6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/147951efae8481bf078a9b1fb9cde0449ef0234f4dde7d565b3773825bdd0ed6?s=96&d=mm&r=g\",\"caption\":\"Talium\"},\"sameAs\":[\"https:\/\/www.talium-assets.com\"],\"url\":\"https:\/\/www.talium-assets.com\/fr\/author\/talium\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX","description":"Contexte Avec l'\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/","og_locale":"fr_FR","og_type":"article","og_title":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX","og_description":"Contexte Avec l'\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le","og_url":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/","og_site_name":"Talium-assets","article_published_time":"2019-02-14T09:16:19+00:00","og_image":[{"width":1080,"height":570,"url":"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2022\/03\/Talium-Assets-1.png","type":"image\/png"}],"author":"Talium","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Talium","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#article","isPartOf":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/"},"author":{"name":"Talium","@id":"https:\/\/www.talium-assets.com\/#\/schema\/person\/3bb5330fcc10a764e42c3dc1cd9fb965"},"headline":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX","datePublished":"2019-02-14T09:16:19+00:00","dateModified":"2019-02-14T09:16:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/"},"wordCount":1131,"publisher":{"@id":"https:\/\/www.talium-assets.com\/#organization"},"image":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage"},"thumbnailUrl":"","articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/","url":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/","name":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX","isPartOf":{"@id":"https:\/\/www.talium-assets.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage"},"image":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-02-14T09:16:19+00:00","dateModified":"2019-02-14T09:16:19+00:00","description":"Contexte Avec l'\u00e9mergence des services cloud, nous sommes amen\u00e9s \u00e0 stocker nos donn\u00e9es sur des serveurs distants, essentiellement hors de notre contr\u00f4le","breadcrumb":{"@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.talium-assets.com\/fr\/protection-donnees-avec-enclave-intel-sgx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.talium-assets.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Am\u00e9liorez la protection de vos donn\u00e9es avec SGX"}]},{"@type":"WebSite","@id":"https:\/\/www.talium-assets.com\/#website","url":"https:\/\/www.talium-assets.com\/","name":"Talium-assets","description":"Next level Tokenization Platform","publisher":{"@id":"https:\/\/www.talium-assets.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talium-assets.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.talium-assets.com\/#organization","name":"Talium-assets","url":"https:\/\/www.talium-assets.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.talium-assets.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2024\/04\/Talium_Assets_Logo.png","contentUrl":"https:\/\/www.talium-assets.com\/wp-content\/uploads\/2024\/04\/Talium_Assets_Logo.png","width":1594,"height":548,"caption":"Talium-assets"},"image":{"@id":"https:\/\/www.talium-assets.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/68882684\/admin\/feed\/posts\/"]},{"@type":"Person","@id":"https:\/\/www.talium-assets.com\/#\/schema\/person\/3bb5330fcc10a764e42c3dc1cd9fb965","name":"Talium","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.talium-assets.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/147951efae8481bf078a9b1fb9cde0449ef0234f4dde7d565b3773825bdd0ed6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/147951efae8481bf078a9b1fb9cde0449ef0234f4dde7d565b3773825bdd0ed6?s=96&d=mm&r=g","caption":"Talium"},"sameAs":["https:\/\/www.talium-assets.com"],"url":"https:\/\/www.talium-assets.com\/fr\/author\/talium\/"}]}},"modified_by":"Talium","_links":{"self":[{"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/posts\/3025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/comments?post=3025"}],"version-history":[{"count":0,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/posts\/3025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/media?parent=3025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/categories?post=3025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talium-assets.com\/fr\/wp-json\/wp\/v2\/tags?post=3025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}