-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…
-
## High level with TEE
- Create a reproducible build
- Add code to generate an attestation document at runtime for your chosen trusted execution environment (e.g. AMD SEV, Intel SGX, or AWS Nitro …
-
I'm testing ACM-Enclave on a c6g.xlarge machine (it plays the same on a c6i.xlarge).
Both tests (acm/no-acm) have been executed on the same machine, only changing the Apache configuration to use a …
-
At this moment, the owner tool only uses keys (in der format) on the file system.
We should also add support for Parsec stored keys, so we can actually use keys that are for example in secure storage…
-
It appears the said deployment creates a private load balancer which is not accessible from a third-party server (not AWS).
Is it possible to amend repository to make it possible to access it extern…
-
**Requested feature**
A make target or instructions to create all the artifacts to run an instance of veracruz.
**Motivation**
Reducing complexity for a user to try Veracruz and run and debug was…
-
This is a tracking issue for incorporating Hardware Attested Platforms, aka Trusted Computing into SLSA. The main idea is to provide greater trust in the build by using trusted computing features like…
-
For some applications, it would helpful to persist the OPRF key across restarts, or clone it among a cluster of instances. Implementing this is somewhat sensitive, since the whole point of the PPOPRF …
-
Related to https://github.com/aws/aws-nitro-enclaves-acm/pull/130
This is blocked until a new release of `aws-nitro-enclaves-acm` is released that includes this change and available through the AL2…
-
**This is a Feature Request**
**What would you like to be added**
Add documentation that covers the different ways to protect communications in transit for a workload.
Explain prerequisi…
sftim updated
6 months ago