-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Propose to add one use case of security context establishment and propagation #35
base: main
Are you sure you want to change the base?
Conversation
…pagation Propose to add one use case of security context establishment and propagation
Max, are machine learning models really so valuable to companies that they want to prevent competitors or other parties to see them unencrypted? I think that is the most important assumption behind your use case. |
I believe your text is good otherwise but I think we will need to talk a bit about confidential computing before we add the description. IMHO we should definitely touch confidential computing in this architecture document! |
Hi Hannes, Good question, we do see the trends that machine learning models (including domain-specific training data) are considered as valuable and important assets for many stakeholders in the ecosystem so they have higher security requirements for the computing environment. |
I agree we should touch confidential computing in this architecture document. |
I would suggest to generalise this use case beyond LLM. Hardware attestation and propagation of attested identity is useful for many other applications - for example processing PII have severe legal implications and many organisations want to mitigate associated risks. |
Hi Yaroslav, Thanks for the comments, will update the text soon. |
…y context establishment and propagation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
generalized the use case of security context establishment and propagation.
@hannestschofenig @yaroslavros Could you please review the updated text? thanks |
Propose to add one use case of security context establishment and propagation.