Search documentation…

Search documentation…

  • Documentation

  • Security Model

  • Documentation

  • Security Model

Defense-in-Depth:

Defense-in-Depth:

Hardware Root of Trust:

Hardware Root of Trust:


  • Remote attestation via Intel PCCS

  • Enclave memory encryption via MKTME


  • Remote attestation via Intel PCCS

  • Enclave memory encryption via MKTME

Data Sovereignty:

Data Sovereignty:


  • Shamir secret sharing (5/9 shards)

  • AES-256-GCM-SIV per-agent encryption


  • Shamir secret sharing (5/9 shards)

  • AES-256-GCM-SIV per-agent encryption

Application Layer:

Application Layer:


  • OPA/Gatekeeper for RBAC

  • Cilium network policies


  • OPA/Gatekeeper for RBAC

  • Cilium network policies

Last updated on

Feb

22,

2025

Last updated on

Feb

22,

2025

ON THIS PAGE

BACK TO TOP