Documentation
Security Model
Documentation
Security Model
Security Model
Security Model
Defense-in-Depth:
Defense-in-Depth:
Hardware Root of Trust:
Hardware Root of Trust:
Remote attestation via Intel PCCS
Enclave memory encryption via MKTME
Remote attestation via Intel PCCS
Enclave memory encryption via MKTME
Data Sovereignty:
Data Sovereignty:
Shamir secret sharing (5/9 shards)
AES-256-GCM-SIV per-agent encryption
Shamir secret sharing (5/9 shards)
AES-256-GCM-SIV per-agent encryption
Application Layer:
Application Layer:
OPA/Gatekeeper for RBAC
Cilium network policies
OPA/Gatekeeper for RBAC
Cilium network policies
Last updated on
Feb
22,
2025
Last updated on
Feb
22,
2025