Skip to main content
Version: Next

Security overview

Contrast is designed to thoroughly protect your deployment and data from the underlying infrastructure. This section outlines the security goals and the associated threat model.

Security goals

  • Confidentiality: All data processed remains encrypted at all times: During transit, at rest and even while processing through runtime encryption.

  • Isolation: By design, Contrast strictly isolates workloads from the underlying infrastructure. It prevents access by infrastructure providers, data center personnel, privileged cloud administrators, and external malicious actors.

  • Integrity and authenticity: Contrast ensures that all workloads are running in a trusted and intended state. The integrity and authenticity of workloads is ensured through remote attestation.

Threat model and mitigations

This section outlines the types of threats Contrast is designed to mitigate.

Out of scope:

  • Vulnerabilities in application logic (for example broken access controls)
  • Hardware-level attacks on Confidential Computing (for example side-channel exploits)
  • Denial-of-service (DoS) and other availability-focused attacks

Threat actors

Contrast protects against five main types of attackers:

  • Malicious cloud insider: Cloud provider employees or contractors with privileged access across physical infrastructure, hypervisors, or Kubernetes control planes. They may tamper with VM resources, intercept data, or restrict runtime behavior (for example limit memory, alter disk volumes, or change firewall rules).

  • Malicious cloud co-tenant: A cloud user who breaks out of isolation to target neighboring tenants. Though lacking physical access, they may achieve similar effects to insiders through persistent exploitation.

  • Malicious workload operator: Kubernetes administrators or DevOps engineers with access to workload deployment and orchestration tools. Their influence spans everything above the hypervisor.

  • Malicious attestation client: Attempts to disrupt or bypass the attestation service by sending malformed or intentionally deceptive requests.

  • Malicious container image provider: Publishes container images that include malicious functionality (for example backdoors or unauthorized data access logic).

Attack surfaces

AttackerTargetSurfaceRisk
Cloud insiderConfidential Container, WorkloadPhysical memoryMay extract secrets by dumping VM memory
Cloud insider, co-tenant, operatorConfidential Container, WorkloadDisk (read/write)May inspect or modify data stored on disk
Cloud insider, co-tenant, operatorConfidential Container, WorkloadKubernetes control planeCan alter environment variables, mounts, and workload metadata
Cloud insider, co-tenant, operatorConfidential Container, WorkloadContainer runtimeMay use APIs (for example kubectl exec) to access workloads
Cloud insider, co-tenant, operatorConfidential Container, WorkloadNetworkCan intercept traffic to registries, attestation endpoints, or other workloads
Malicious attestation clientAttestation serviceAttestation interfaceMay disrupt the attestation flow with invalid or malformed input
Malicious image providerWorkloadContainer imageMay introduce compromised logic or hidden behavior into the workload

Mitigations

Contrast mitigates these threats using three core components:

  1. Runtime environment: protects memory, disk, and VM integrity
  2. Runtime policies: define and enforce workload integrity and configuration
  3. Service mesh: secures all internal and external communication

Attacks on the confidential container environment

ThreatMitigationWhere it's enforced
Intercepting network traffic during workload launch or image pullReflected in attestation report; assumes images are public and contain no embedded secretsPolicies, Attestation
Modifying the workload image post-downloadPrevented by dm-verity-protected read-only partitionsRuntime environment
Changing runtime settings via the Kubernetes control planeDetected by runtime policies and validated through attestationPolicies, Attestation

Attacks on the attestation service

ThreatMitigationWhere it's enforced
Modifying or hijacking the Coordinator deploymentCoordinator is itself attested; images are reproducible and protected via a secured supply chainAttestation
Intercepting secrets in transit between workload and CoordinatorTLS with attested identities ensures encryption and prevents impersonationService mesh and attestation protocol
Exploiting attestation parsing edge casesHandled by a memory-safe Go parser tested against vendor specifications; policies are fully auditableCoordinator
Overloading the attestation service (DoS)Will be mitigated by making the Coordinator scalable and fault-tolerantCoordinator

Attacks on workloads

ThreatMitigationWhere it's enforced
Eavesdropping on inter-container communicationPrevented by automatic TLS encryption across all intra-cluster communicationService mesh
Reading or altering data on persistent volumesPersistent volumes aren't yet supported; future support will include encryption and integrity protectionsRuntime environment
Publishing compromised workload imagesUpdates require explicit policy approval and must match attested, verified workload configurationsAttestation

Real-world scenarios

Use CaseExample
Secure cloud migrationTechSolve Inc. moves sensitive workloads to the cloud. As both image provider and data owner, they're exposed to threats from insiders and co-tenants. Contrast ensures data isolation and workload integrity.
Trusted SaaS deliverySaaSProviderX wants to prove to customers that even internal admins can't access their data. With Contrast, customers retain control, while the SaaS provider is excluded from the trusted base.
Regulatory complianceHealthSecure Inc. migrates analytics to the cloud while handling patient data. Regulators require verifiable isolation. Contrast provides attestable guarantees that only authorized workloads process sensitive data.

In all scenarios, Contrast ensures that only authorized workloads can access sensitive data. It offers verifiable isolation from infrastructure and control-plane actors, while giving data owners full visibility and control over the runtime environment.