How to implement 3D-Secure authentication in 2025
The most notable considerations for implementing 3D-Secure authentication in 2025
Update: As of January 2024, Evervault Cages has been renamed Enclaves. Learn more about Evervault Enclaves.
Last month we launched Cages, a service for easily deploying and scaling AWS Nitro Enclaves. Here's why.
*Note: in this post we'll use the terms Enclave and Trusted Execution Environment (TEE) interchangeably.
A Secure Enclave, also known as a Trusted Execution Environment (TEE), is a highly constrained compute environment that allows for cryptographic verification (attestation) of the code being executed.
The most widely known implementation of a secure enclave came from the 2013 release of the Apple iPhone 5. Featuring a dedicated chip for processing the fingerprints of a user with Touch ID, millions of people were exposed to a leap in application security. Since then, various applications now use enclaves to process biometric data, financial transactions, and provide trustless account recovery, and signature verification. Hamstrung by hardware limits and scarce availability in the cloud, TEEs have only been exposed to a small fraction of application features they should be used for. At Evervault, we understand the potential TEEs have to protect data – entire classes of threat vectors such as data exfiltration, malware, and internal bad actors become far harder to exploit.
Since the inception of Evervault, the mission of the company necessitated the use of Enclaves. We encountered the constraints of Intel’s SGX platform early on with our node-secureworker project. Trying to cram runtimes into tiny isolated enclaves that degraded performance wasn’t very popular with developers. We needed a platform that would provide isolated hardware and remote attestation without impacting application performance. AWS Nitro Enclaves provided us with that platform.
We first used Nitro Enclaves when we built the Evervault Encryption Engine (E3). We decided to deploy E3 in an Enclave so that we could have the extra security guarantees of TEEs, like:
AWS Enclaves are great for all of the above reasons. However, they're a nascent technology with some important technical challenges that need to be navigated:
We estimate that these challenges added roughly 12 weeks of engineering work to our E3 build.
Evervault's mission is to encrypt the web. We deeply believe Enclaves are the safest place to process encrypted data, and this technology has the potential to foundationally improve the security of the internet. So why is it hidden behind all this unnecessary overhead?
We decided to build a product (now called Cages) to abstract away this pain and make it easy for developers to deploy any application they want into an Enclave. The developer experience should make Enclaves more accessible while maintaining the existing rigorous security standards.
To achieve this, our users would need the following features on top of Secure Enclaves.
They should be able to easily deploy any application as an Enclave, and be able to make requests to it over the internet.
Any time they make a request to their application, they should be able to attest that the Enclave they are connecting to is running the exact container they built on their machine. This attestation should happen before any sensitive data is sent.
We should be able to prove that Evervault does not need to be a trusted party in this attestation flow and that Evervault is not able to view or tamper with the data that users are sending to the Enclave. Even if Evervault were malicious, it should be impossible for us to spoof the user.
With our newest product release, Cages, we aim to achieve this. Over the next couple of weeks, we will release a series of posts that details ‘How We Built Cages’ step-by-step, and we hope you’ll follow along.
If you’re interested in trying out Cages, sign up for our beta here.
Engineer