Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Propose to add one use case of security context establishment and propagation #35

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

maxpassion
Copy link

Propose to add one use case of security context establishment and propagation.

…pagation

Propose to add one use case of security context establishment and propagation
@hannestschofenig
Copy link
Collaborator

Max, are machine learning models really so valuable to companies that they want to prevent competitors or other parties to see them unencrypted? I think that is the most important assumption behind your use case.

@hannestschofenig
Copy link
Collaborator

I believe your text is good otherwise but I think we will need to talk a bit about confidential computing before we add the description. IMHO we should definitely touch confidential computing in this architecture document!

@maxpassion
Copy link
Author

Max, are machine learning models really so valuable to companies that they want to prevent competitors or other parties to see them unencrypted? I think that is the most important assumption behind your use case.

Hi Hannes,

Good question, we do see the trends that machine learning models (including domain-specific training data) are considered as valuable and important assets for many stakeholders in the ecosystem so they have higher security requirements for the computing environment.

@maxpassion
Copy link
Author

I believe your text is good otherwise but I think we will need to talk a bit about confidential computing before we add the description. IMHO we should definitely touch confidential computing in this architecture document!

I agree we should touch confidential computing in this architecture document.

@yaroslavros
Copy link
Collaborator

I would suggest to generalise this use case beyond LLM. Hardware attestation and propagation of attested identity is useful for many other applications - for example processing PII have severe legal implications and many organisations want to mitigate associated risks.

@maxpassion
Copy link
Author

I would suggest to generalise this use case beyond LLM. Hardware attestation and propagation of attested identity is useful for many other applications - for example processing PII have severe legal implications and many organisations want to mitigate associated risks.

Hi Yaroslav, Thanks for the comments, will update the text soon.

Copy link
Author

@maxpassion maxpassion left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

generalized the use case of security context establishment and propagation.

@maxpassion
Copy link
Author

generalized the use case of security context establishment and propagation.

@hannestschofenig @yaroslavros Could you please review the updated text? thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants