Software Guard Extensions CyberNext
JANUARY 11, 2018
#SGX
Design Problem
A CyberNext event is one that allows established industry technology to be brought before the Air Force to generate potential use cases for application of the technology within the Air Force environment.
The CyberNext SGX event provided an opportunity for Intel to demonstrate its technology with partner Jeppesen, using its Electronic Flight Bag (EFB) to answer the question: “How might we use this type of technology to best improve AF/DoD ops? How might we use it to accelerate these types of technology into the DoD enterprise?”
“How might we use this type of technology to best improve AF/DoD ops? How might we use it to accelerate these types of technology into the DoD enterprise?”

Outcomes:
This event highlighted Intel’s Software Guard Extensions (SGX) technology, which provides security at the hardware level rather than strictly through software. SGX protects applications and data as they are exposed to malicious attacks by hiding the data in secure enclave.
Intel demonstrated their SGX proof of concept with the EFB in regard to memory security, lost device security, and exploit security. Teams developed potential use case scenarios centered on the human experience with SGX or like technology.
Proposed Solutions:
The use cases with the most votes were expanded upon into strategy boards to include a brief future vision, potential barriers to that vision, and a suggested way ahead.
Remote Date Destruct: A System Administrator needs a way to ensure data on lost devices is secure from unauthorized access because data contains PII and PHI and some devices may not have full disk encryption.
Multi-Level Single-System C2: C2 elements need a better way to process multiple levels of data on fewer systems in a secure manner so that they can collaborate more effectively with fewer systems and data leaks.
PII Protection Parameters: System Administrator needs a way to ensure data on lost devices is secure from unauthorized access because data contains PII and PHI and some devices may not have full disk encryption.
Airmen’s Any Device: A teleworker needs to complete work with appropriate access to work data so that they would have a secure work space in any location.
Single Joint Access Point: A multi-national partner needs a way to securely control who can see what information for “Mission Partner Networking” without having to have numerous single-use networks.