Intel SGX
What is Intel SGX?
Intel SGXIntel Software Guard Extensions, a CPU instruction set that creates encrypted memory enclaves to protect code and data from a compromised OS or hypervisor.
Intel SGX (Software Guard Extensions) is a trusted execution environment introduced with Skylake (2015) that lets applications carve out an encrypted memory region called an enclave. Code and data inside the enclave are protected by an on-die Memory Encryption Engine, isolated from the OS, hypervisor, and other applications, and can be remotely attested using EPID or DCAP. SGX has been the target of numerous side-channel and transient-execution attacks - Foreshadow, Plundervolt, AEPIC, and SGAxe - prompting microcode mitigations. Intel deprecated SGX on consumer Core CPUs starting with 11th-gen but still ships and supports it on Xeon Scalable processors aimed at confidential computing, where it underpins Azure DCsv3 VMs and Fortanix DSM.
● Examples
- 01
Signal's Secure Value Recovery service runs inside SGX enclaves.
- 02
Azure confidential computing DCsv3 series exposes SGX EPC to tenants.
● Frequently asked questions
What is Intel SGX?
Intel Software Guard Extensions, a CPU instruction set that creates encrypted memory enclaves to protect code and data from a compromised OS or hypervisor. It belongs to the Cryptography category of cybersecurity.
What does Intel SGX mean?
Intel Software Guard Extensions, a CPU instruction set that creates encrypted memory enclaves to protect code and data from a compromised OS or hypervisor.
How does Intel SGX work?
Intel SGX (Software Guard Extensions) is a trusted execution environment introduced with Skylake (2015) that lets applications carve out an encrypted memory region called an enclave. Code and data inside the enclave are protected by an on-die Memory Encryption Engine, isolated from the OS, hypervisor, and other applications, and can be remotely attested using EPID or DCAP. SGX has been the target of numerous side-channel and transient-execution attacks - Foreshadow, Plundervolt, AEPIC, and SGAxe - prompting microcode mitigations. Intel deprecated SGX on consumer Core CPUs starting with 11th-gen but still ships and supports it on Xeon Scalable processors aimed at confidential computing, where it underpins Azure DCsv3 VMs and Fortanix DSM.
How do you defend against Intel SGX?
Defences for Intel SGX typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Intel SGX?
Common alternative names include: SGX, Software Guard Extensions.
● Related terms
- cloud-security№ 1177
Trusted Execution Environment (TEE)
A secure, isolated execution context within a processor where code and data are protected in confidentiality and integrity, even from the host OS and hypervisor.
- cryptography№ 044
AMD SEV / SEV-SNP
AMD EPYC technology that encrypts and integrity-protects each virtual machine's memory, isolating guests from a malicious or compromised hypervisor.
- cryptography№ 060
ARM TrustZone
A hardware security extension on ARM CPUs that partitions the SoC into a Secure World and a Normal World, providing a TEE for keys, DRM, and biometric data.
- cloud-security№ 208
Confidential Computing
Protecting data while it is being processed by running workloads inside hardware-based Trusted Execution Environments that isolate them from the host and the cloud operator.
- cryptography№ 460
Hardware Attestation
A cryptographic protocol by which a device proves its identity and software measurements to a remote verifier using a key rooted in tamper-resistant hardware.
- vulnerabilities№ 1038
Side-Channel Attack
An attack that recovers secrets from a system by observing physical or implementation characteristics — timing, power, electromagnetic emissions, caches, acoustic signals — rather than logical flaws.