enclaive Development Kit

Here you will find some practical tutorials for enclaive's confidential computing solution using Intel SGX.

Download the enclaive development kit from Github

Intel SGXv2-ready Containers

The following containers are available to deploy workloads in enclaves.

mysql-sgx MariaDB-SGX

mongodb-sgx MongoDB-SGX

redis-sgx Redis-SGX

nodejs-sgx Nodejs-SGX

python-sgx Python-SGX

rust-sgx Rust-SGX

go-sgx Go-SGX

php-sgx PHP-SGX

ruby-sgx Ruby-SGX

java-sgx Java-SGX

c-sgx C-SGX

cplusplus-sgx Cpp-SGX

csharp-sgx Csharp-SGX

mosquitto-sgx Mosquitto-SGX

nginx-sgx Nginx-SGX

wordpress-sgx Wordpress-SGX

umami-sgx Umami-SGX

hashicorp-vault-sgx Always encrypted Hashicorp Vault

Prerequisites

To utilize the features of Intel Software Guard Extensions (SGXv2), a CPU with SGX support is necessary. The CPU must also support SGX Flexible Launch Control with Measured Boot. It is also highly recommended that the memory size of the host machine should be equal to or greater than 16 GB to ensure that there is enough memory.

In the realm of confidential computing with SGX, a cloud service provider plays a crucial role beyond merely providing the hardware. They are responsible for delivering specific services necessary for the smooth operation of the Data Center Attestation Primitives (DCAP) attestation flow.

The following cloud infrastructures are equipped with SGX-ready capabilities by default:

Please note that the information may not reflect the latest updates or additions by the cloud providers. It's always advisable to check with the providers directly or refer to their official documentation for the most up-to-date information on their SGX-ready cloud infrastructures. Furthermore, Confidential computing is a rapidly evolving field, and cloud providers consistently enhance their offerings with confidential computing capabilities. If your preferred infrastructure provider is not listed here, please feel free to contact us. We'll be glad to assist you in finding the right solution.

Last updated