Several steps are involved in the process of Confidential Computing. An environment in the form of an encrypted container has to be created around the application (1), so it runs inside a TEE. The encrypted container can then be deployed on Intel-SGX capable servers (2) using our pre-configured secure Kubernetes cluster (3). Finally, the integrity and genuineness of the TEE and the hash of the binary it is executing can be proven and verified (4).
At Securitee, we offer the secure infrastructure with pre-configured secure Kubernetes cluster (2) + (3), some pre-configured environments as well as support in the environment creation process as a service (1). We also cover the process of remote attestation (4) as a service.