×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

Enclaves in both SGX (hardware implementation) and the Komodo system will introduce a monitor, which does not have to be trusted to provide security. Is this so?

by Jose Carvalho / Friday, 13 February 2026 / Published in Cybersecurity, EITC/IS/CSSF Computer Systems Security Fundamentals, Secure enclaves, Enclaves

The question at hand concerns the trust assumptions regarding monitors in the context of enclaves, specifically comparing Intel SGX (Software Guard Extensions) as a hardware implementation and the Komodo system, which utilizes software-based mechanisms. The core of the inquiry is whether security can be maintained even if the monitor component—an entity responsible for certain control and management functions—does not need to be trusted.

Secure Enclaves: Conceptual Foundation

A secure enclave is a protected area of execution within a computing system, isolated from the rest of the system and its software stack. The enclave model ensures the confidentiality and integrity of code and data within the enclave, even if the operating system, hypervisor, or other privileged software is compromised. This isolation is fundamental in defending against a broad range of attacks, including those perpetrated by a potentially malicious or compromised operating system.

Intel SGX: Hardware-Enforced Enclaves

Intel SGX provides hardware-enforced enclaves by extending the x86 instruction set. SGX enclaves are created, managed, and destroyed by a combination of CPU instructions and microcode, with the hardware enforcing memory isolation. The SGX threat model strictly assumes that all software outside the enclave, including the OS, hypervisor, drivers, and any system management mode (SMM) code, is untrusted.

– Monitor Role in SGX: SGX does not rely on a software monitor for enforcing isolation or protecting enclave integrity and confidentiality. All control operations related to enclave management (creation, entry, exit, and destruction) are mediated by the processor itself via dedicated instructions, with the hardware ensuring that only authorized code can access enclave memory (Enclave Page Cache, or EPC).
– Trust Boundaries: The root of trust in SGX resides in the CPU hardware and its microcode, not in any software monitor. Any privileged software, including a hypothetical 'monitor', can request operations like context switches or paging of enclave memory, but cannot access the contents of EPC pages. Malicious attempts by the OS or other software to interfere with enclave execution will result only in the enclave being terminated or interrupted, not compromised.
– Implication: The security of the enclave does not depend on the trustworthiness of any external monitor or management component. The monitor (if present, e.g., for orchestrating context management) is not a part of the enclave's trusted computing base (TCB).

Komodo System: Software-Based Enclaves

Komodo is a research system that aims to provide enclave-like security guarantees in environments where hardware support akin to SGX is unavailable. Komodo achieves this by running a minimal, verifiable monitor at a high privilege level. This monitor is responsible for enforcing isolation between enclaves and the rest of the system.

– Monitor in Komodo: The Komodo monitor is a small software component, designed to be amenable to formal verification, which handles secure context switches, protection of memory regions, and other isolation functions. In contrast to SGX, the monitor in Komodo is included in the TCB.
– Trust Assumptions: Unlike SGX, the monitor in Komodo must be trusted for the system's security guarantees to hold. If the monitor is compromised, an attacker could subvert the isolation mechanisms, gaining access to enclave memory or manipulating enclave execution.
– Mitigation: Komodo attempts to minimize the amount of code that must be trusted by reducing the monitor to a small, verifiable component. However, from a security assurance perspective, trust in the monitor cannot be eliminated, only reduced or better justified through verification.

Critical Comparison: Trust in the Monitor

– SGX: The monitor does not need to be trusted. All security-sensitive operations are enforced by the CPU hardware. There is no software monitor within the TCB. The enclave can withstand compromise of all system software, including a monitor, OS, and hypervisor.
– Komodo: The monitor must be trusted. Security depends on the correct and uncompromised operation of the monitor. While efforts are made to keep it small and verifiable, the monitor is still part of the TCB.

Didactic Examples

1. Hypothetical Compromised Monitor in SGX:
– Consider a scenario where a privileged software component (acting as a monitor) is malicious and tries to read enclave memory. In SGX, hardware memory protection mechanisms prevent any non-enclave code, including the monitor, from accessing EPC contents. The result is that the attack fails; the monitor’s trustworthiness is irrelevant to enclave security.

2. Hypothetical Compromised Monitor in Komodo:
– In the Komodo system, if the monitor is compromised, it can subvert memory isolation, intercept context switches, or directly access enclave memory. As the monitor operates at a higher privilege level than the enclaves, it has the technical capability to bypass their protections. Thus, the trustworthiness of the monitor is critical.

3. Real-World Implications:
– In cloud environments, where an attacker might gain control over the hypervisor or OS, SGX’s hardware isolation ensures that confidential data within enclaves remains protected. In Komodo, similar attacks would only be prevented if the monitor remains uncompromised and correctly implemented.

Underlying Security Principles

The difference arises from the root of trust in each system. SGX leverages hardware as the root of trust, eliminating the need for trust in external software components. Komodo, lacking hardware enforcement, must rely on a small, trusted software monitor to establish the root of trust.

This distinction is fundamental to secure enclave design:

– Hardware-Enforced Enclaves (e.g., SGX): Minimal TCB, with hardware as the primary enforcer of security properties.
– Software-Enforced Enclaves (e.g., Komodo): Slightly larger TCB, with the monitor as a critical component.

Security Assurance and Formal Verification

One approach to mitigating the increased TCB in software-based systems like Komodo is to keep the monitor as simple as possible and to formally verify its correctness. Formal verification involves mathematically proving that the monitor’s implementation adheres to its specification and enforces the desired security properties. While this increases assurance, it does not eliminate the need to trust the monitor: any bugs or vulnerabilities in the monitor may compromise the entire system.

Conclusion of Comparison

The assertion that "enclaves in both SGX (hardware implementation) and the Komodo system will introduce a monitor, which does not have to be trusted to provide security" is factually incorrect. In SGX, the monitor does not need to be trusted for enclave security; in Komodo, it must be trusted. This highlights an important principle in system security design: the placement and minimization of the TCB, and the effectiveness of hardware versus software-based isolation.

Other recent questions and answers regarding Enclaves:

  • To complete the attestation process of the enclave, must the client independently generate and use a random hash value?
  • Would an attestation enclave provide the answer to the client without the participation of the monitor?
  • Why the client needs to trust the monitor during the attestation process?
  • Is the goal of an enclave to deal with a compromised operating system, still providing security?
  • What is a potential use case for enclaves, as demonstrated by the Signal messaging system?
  • What are the steps involved in setting up a secure enclave, and how does the page GB machinery protect the monitor?
  • What is the role of the page DB in the creation process of an enclave?
  • How does the monitor ensure that it is not misled by the kernel in the implementation of secure enclaves?
  • What is the role of the Chamorro enclave in the implementation of secure enclaves?
  • What is the purpose of attestation in secure enclaves and how does it establish trust between the client and the enclave?

View more questions and answers in Enclaves

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/CSSF Computer Systems Security Fundamentals (go to the certification programme)
  • Lesson: Secure enclaves (go to related lesson)
  • Topic: Enclaves (go to related topic)
Tagged under: Cybersecurity, Enclave, Komodo, Monitor, SGX, Trusted Computing Base
Home » Cybersecurity » EITC/IS/CSSF Computer Systems Security Fundamentals » Secure enclaves » Enclaves » » Enclaves in both SGX (hardware implementation) and the Komodo system will introduce a monitor, which does not have to be trusted to provide security. Is this so?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.
Eligibility for EITCA Academy 90% EITCI DSJC Subsidy support
90% of EITCA Academy fees subsidized in enrolment

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2026  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?
    We will reply here and by email. Your conversation is tracked with a support token.