Skip to content

Intro

Confidential computing

Confidential computing protects the data while being processed in a CPU. The data used during the processing are only accessible by the authorized source code. This technology reduces the chance of exposing sensitive data to non trusted agents.

Attestation

A secure enclave uses an attestation document to prove its identity to an external service. This step is fundamental for protecting sensitive data from impersonating attacks. Visit Attestation in the documentation to learn more.

Secrets Management

The secret manager has the role of giving access to sensitive data only to trusted code. The secrets manager is in charge of verifying the attestation document sent in the request and giving access if the verification is successful. Visit Secrets Management in the documentation to learn more.

Verifiably Documentation