⬤ ⬤ ⬤$ enclaver build \
-f enclaver.yaml
Tagged example/enclave:v1
$ enclaver run example/enclave:v1
Starting egress proxy on vsock port 17002
Started enclave i-00e43bfc030dd8469-enc1840fa584262e1a
Connected to enclave, starting log stream
Starting "python -m flask run --host=0.0.0.0 --port=8001"
* Serving Flask app "/opt/app/server.py"
Enclaves provide several critical features for operating software which processes sensitive data, including:
Isolation: Enclaves guarantee that sensitive data inserted, processed or decrypted can never be read by an attacker and leave the enclave.
Attestation: Enclaves make it possible to determine the exact identity and configuration of software running in an enclave.
Network Restrictions: External communication is limited and controlled. The network policy is built into the image and therefore the software attestation.
Enclaver currently supports AWS Nitro Enclaves, with more coming in the future.
Enclaver's attestation and code identity are anchored in a hardware root of trust, which secures application builds and signing operations.
Paired with a Software Bill of Materials (SBOM) produced from the enclave, your security and engineering teams can have high confidence in the integrity of the build process & understand their dependency risks — all tied back to the source code.
Share supply chain artifacts with your customers to build trust, allow them to gain insight and verifiable claims about the security of your software, and meet government Supply Chain Regulations and Legal Requirements
Use Enclaver with EdgeBit's Supply Chain Security PlatformIcons from: DEB File by Arthur Shlain from Noun Project • RPM File by Arthur Shlain from Noun Project