Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
Arm Community blogs
Arm Community blogs
Servers and Cloud Computing blog How Fujitsu implemented confidential computing on FUJITSU-MONAKA with Arm CCA
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded and Microcontrollers blog

  • Internet of Things (IoT) blog

  • Laptops and Desktops blog

  • Mobile, Graphics, and Gaming blog

  • Operating Systems blog

  • Servers and Cloud Computing blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tags
  • CPU Architecture
  • Artificial Intelligence (AI)
  • gpu
  • Edge Computing
  • DeveloperUseCase
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

How Fujitsu implemented confidential computing on FUJITSU-MONAKA with Arm CCA

Marc Meunier
Marc Meunier
October 13, 2025
5 minute read time.

Introduction

The FUJITSU-MONAKA project is a case study in how confidential computing can be embedded into silicon and software in a way that developers and operators can readily adopt alongside other Arm-based solutions.

What is FUJITSU-MONAKA?

FUJITSU-MONAKA is Fujitsu’s next-generation Armv9-based general processor, for high-performance computing (HPC), datacenter and edge computing, aimed at accelerating AI while meeting today’s security and sustainability needs. It builds on Fujitsu’s long heritage in supercomputing, mainframes and business servers, featuring:

  • 3D chiplet-based architecture, including high speed and bandwidth interface, for scalable performance.
  • Ultra-low-voltage design reduces power draw and thermal load.
  • 144 Armv9 cores per socket in a standard two-socket configuration.
  • Scalable Vector Extension 2 (SVE2) with 256-bit vectors to boost AI, DSP, and floating-point workloads, delivering more results per watt.
  • Hardware-based trusted execution environments for confidential computing.

Isolation from hypervisors

Realm Management Extension (RME) introduces Realms: hardware-isolated execution environments that make the contents of sensitive workloads inaccessible to the host OS or hypervisor. Each Realm is protected with unique, hardware-derived keys. FUJITSU-MONAKA’s boot chain measures and verifies the Realm Management Monitor (RMM), which creates and manages Realms. When a Realm is launched, it generates an attestation token, a cryptographic proof that the workload is genuine and untampered and is running on a trustworthy platform. Tools for processing and verifying these claims are being developed in the open via the Confidential Computing Consortium (CCC).

For engineers, this means FUJITSU- MONAKA provides:

  • A standardized interface to create and manage Realms.
  • Built-in attestation that integrates with open source-based verification systems.
  • Scheduling control retained by the hypervisor, but with no access to Realm data.

Security extension to external devices (GPU)

FUJITSU-MONAKA is a versatile platform that follows a hybrid AI strategy, assigning appropriate workloads across the full spectrum of AI to CPUs and GPUs. FUJITSU-MONAKA’s CPU architecture is specifically optimized for efficient AI inference at the edge and for smaller language models that should not require a GPU. Meanwhile, for more demanding AI training and large language models (LLMs), where additional processing capabilities are beneficial, FUJITSU-MONAKA is designed to seamlessly integrate with GPUs, offering customers the most optimal scalable solutions for their diverse workloads.

FUJITSU-MONAKA extends Realm isolation beyond the CPU, to encompass accelerators which are assigned to protected workloads. With Arm Confidential Computing Architecture (CCA), AI inference runs inside a Trusted Execution Environment (TEE), ensuring confidential data is processed securely and models remain protected from tampering.

Here, Device Assignment (DA) is critical: using IOMMU/SMMU isolation, hardware units that ensure devices only access authorized memory, FUJITSU-MONAKA achieves:

  • Devices securely assigned to Realms.
  • Memory mapped to them remains Realm-owned.
  • The ability to leverage hardware acceleration for protected workloads.
  • The same level of memory protection applied across CPU and device accesses.

DA securely extends the Trusted Computing Base (TCB) to GPU devices, allowing data to flow confidentially between CPU and GPU. This enables end-to-end Confidential AI, combining high performance with data privacy and model integrity.

Managing memory isolation across chiplets

In addition to implementing RME memory isolation, Fujitsu also engineered FUJITSU-MONAKA’s hierarchical memory architecture, combined with:

  • Non-Uniform Memory Access (NUMA) aware resource allocation.
  • Memory Partitioning and Management (MPAM) based resource management.

This approach efficiently separates workloads and dynamically allocates resources to match application needs. The result is strong workload management across chiplets without sacrificing performance, a critical requirement for AI and HPC scenarios. With memory management and isolation built in at every layer, the next step was to ensure the full boot and trust chain reinforced these protections from silicon upward.

Engineering the boot and trust chain

Fujitsu worked through the full trust chain to ensure confidentiality starts at silicon and extends up the stack:

  • Measured boot anchored in the on-die root of trust.
  • Trusted Firmware-A extended to load and measure the RMM.
  • Realm attestation key and memory access controlled by the RMM, with all transitions verified.

These steps mean every confidential virtual machine (VM) or container launched on FUJITSU-MONAKA begins from a verifiable state. This is critical for regulated industries that need evidence for audits.

Integrating with the software stack

Fujitsu knew adoption depended on operators using familiar tools. FUJITSU-MONAKA integrates confidential computing into existing open-source platforms, with Fujitsu committed to delivering a robust CCA implementation built on open-source principles. This approach ensures reliability, transparency, and innovation, with Fujitsu contributing actively to the community.

Alongside integration with OpenStack, libvirt/QEMU, and KubeVirt, Fujitsu also contributes to the Confidential Containers (CoCo) project under the Cloud Native Computing Foundation (CNCF), focusing on extending CoCo Peer Pods beyond hyperscalers to support open source-based infrastructures like OpenStack. Fujitsu‘s development efforts span attestation software, enhancing its robust capabilities.

Specifically, Fujitsu is actively engaged in the Veraison project and collaborating with Arm to standardize attestation protocols like CoSERV. Through these initiatives, Fujitsu aims to democratize access to CCA across small and mid-sized public clouds, private on-prem environments, and deployments, enhancing data privacy and security wherever workloads run.

Diagram showing how Fujitsu integrates with the software stack.

Developing software before silicon availability

Key milestones in FUJITSU-MONAKA’s software stack development began with Fujitsu’s early commitment to Arm RME, recognizing the need for Confidential Computing. Intensive work on Arm FVP (Fixed Virtual Platform) and other emulation platforms allowed the team to accelerate CCA software development long before silicon availability.

This phase was not only about building but also about validating: Fujitsu used these emulation platforms to test, refine, and harden the CCA software stack against potential threats. Emulation-based development means that when FUJITSU-MONAKA hardware ships it will arrive robust, pre-validated, and deployment-ready.

The Arm Fujitsu partnership

Fujitsu’s collaboration with Arm dates back to the A64FX processor used in the Fugaku supercomputer, under an architectural partnership that established trust and technical alignment. This history carried through into Armv9, where Fujitsu and Arm held ongoing discussions about the architecture and the importance of CCA compliance. That close collaboration reinforced confidence as FUJITSU-MONAKA development advanced.

Beyond hardware, both companies promote the open and standardized use of Arm CCA, jointly contributing to the open-source community to develop key components for virtualization and containers. This partnership accelerates ecosystem growth and ensures CCA adoption across a broad set of environments.

Conclusion

FUJITSU-MONAKA demonstrates how Fujitsu has worked with Arm to bring confidential computing from concept to implementation. By combining Arm CCA with Fujitsu’s engineering across silicon, firmware, and software, FUJITSU-MONAKA delivers a practical platform that spans boot chains, accelerator integration, workload isolation, and open source adoption.

For more on FUJITSU-MONAKA, you can watch their presentation at OC3, 2025:

For more technical resources on Confidential Computing on Arm, visit Arm developer:

Confidential Computing overview

Footnote

[1] FUJITSU-MONAKA: This new technology applied to the FUJITSU-MONAKA is based on results obtained from a project subsidized by the New Energy and Industrial Technology Development Organization (NEDO).

Anonymous
Servers and Cloud Computing blog
  • How Fujitsu implemented confidential computing on FUJITSU-MONAKA with Arm CCA

    Marc Meunier
    Marc Meunier
    Discover how FUJITSU-MONAKA secures AI and HPC workloads with Arm v9 and Realm-based confidential computing.
    • October 13, 2025
  • Pre-silicon simulation and validation of OpenBMC + UEFI on Neoverse RD-V3

    odinlmshen
    odinlmshen
    In this blog post, learn how to integrate virtual BMC and firmware simulation into CI pipelines to speed bring-up, testing, and developer onboarding.
    • October 13, 2025
  • Accelerating early developer bring-up and pre-silicon validation with Arm Neoverse CSS V3

    odinlmshen
    odinlmshen
    Discover the Arm Neoverse RD-V3 Software Stack Learning Path—helping developers accelerate early bring-up and pre-silicon validation for complex firmware on Neoverse CSS V3.
    • October 13, 2025