🌍Tutorials

Here, we are going to showcase several use cases that have seamlessly integrated enclaive's development kit. The kit aims to ease the enclavation of containers.

Kubernetes

Redis in cK8schevron-rightMongoDB in cK8schevron-rightK8s + HashiCorp Vault on Azure DCsv3chevron-right

Docker

arangodb-sgxarrow-up-right ArangoDB-SGX

mysql-sgxarrow-up-right MariaDB-SGX

mongodb-sgxarrow-up-right MongoDB-SGX

redis-sgxarrow-up-right Redis-SGX

mosquitto-sgxarrow-up-right Mosquitto-SGX

nginx-sgxarrow-up-right Nginx-SGX

wordpress-sgxarrow-up-right Wordpress-SGX

umami-sgxarrow-up-right Umami-SGX

hashicorp-vault-sgxarrow-up-right Always encrypted Hashicorp Vault

Confidential Apps in Action

Watch how enclaived docker containers are hacked. The demo code can be found in the `demo` branch of the corresponding enclaive docker container repository.

arrow-up-right Dumping the Redis Memory while in Use (read morearrow-up-right)

arrow-up-right MariaDB Data-in-Use encryption of SQL queries (read morearrow-up-right)

arrow-up-right MongoDB Data-in-Use encyption of password insertion (read morearrow-up-right)

arrow-up-right ArangoDB Data-in-Use Encryption (read morearrow-up-right)

arrow-up-right NodeJS Express and Protection against Runtime Leakage (read morearrow-up-right)

arrow-up-right Attempt to modify protected Volume/Files (read morearrow-up-right)

arrow-up-right Write a file into shared encrypted Volume (read morearrow-up-right)

arrow-up-right HTTPS server prevents the access to X.509 certificate private key (read morearrow-up-right)

Last updated

Was this helpful?