{"version":1,"pages":[{"id":"Ce8Hyiq53fbF4XkiDVqN","title":"Welcome","pathname":"/confidential-cloud","siteSpaceId":"sitesp_jX8zB","description":"This documentation focuses on Confidential Computing using hardware-graded security technologies."},{"id":"bUgB3tFo2ieQY1QWAfR9","title":"What is Confidential Computing","pathname":"/confidential-cloud/confidential-computing/what-is-confidential-computing","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"OKO4qu97ADlFb4kzO9LO","title":"What problems Confidential Computing solves","pathname":"/confidential-cloud/confidential-computing/what-problems-confidential-computing-solves","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"x45mzCcQiF7qqBKUJG2X","title":"Bare Metal","pathname":"/confidential-cloud/confidential-computing/what-problems-confidential-computing-solves/bare-metal","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"What problems Confidential Computing solves"}]},{"id":"XkWZ0ZQhGvcBqxUxTq6K","title":"Docker","pathname":"/confidential-cloud/confidential-computing/what-problems-confidential-computing-solves/docker","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"What problems Confidential Computing solves"}]},{"id":"uaBVaeHFUeo8ttu8xTf8","title":"Kubernetes","pathname":"/confidential-cloud/confidential-computing/what-problems-confidential-computing-solves/kubernetes","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"What problems Confidential Computing solves"}]},{"id":"UThCZEJbGbTBuI643Yl7","title":"Knative","pathname":"/confidential-cloud/confidential-computing/what-problems-confidential-computing-solves/knative","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"What problems Confidential Computing solves"}]},{"id":"ZHK6Kx4uFrhscbnTetJG","title":"Why Confidential Computing","pathname":"/confidential-cloud/confidential-computing/why-confidential-computing","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"u4Rb9vuHKHjhHyVb87nI","title":"How Confidential Computing works","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"Nw39cJa3bhouHCscGeaG","title":"Memory Encryption","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works/memory-encryption","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"How Confidential Computing works"}]},{"id":"pImAWMpcBKWEvNYBuz8C","title":"Workload Attestation","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works/workload-attestation","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"How Confidential Computing works"}]},{"id":"83wmXFlLFdiNtCk3sdSV","title":"Confidential Boot","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works/confidential-boot","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"How Confidential Computing works"}]},{"id":"R67PDsIA1uERGcjhovsh","title":"Sealing / Binding","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works/sealing-binding","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"How Confidential Computing works"}]},{"id":"m4hlzPPoQa9mPqBq3AJK","title":"Secret Provisioning","pathname":"/confidential-cloud/confidential-computing/how-confidential-computing-works/provisioning","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Confidential Computing"},{"label":"How Confidential Computing works"}]},{"id":"nMHsaCaUV3vtso22i7KB","title":"Technology Overview","pathname":"/confidential-cloud/confidential-computing/hardware-secure-enclave","siteSpaceId":"sitesp_jX8zB","description":"Last Update: July 2023","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"4wUYZWxbvStL2DrZ4FIs","title":"Cloud Service Providers","pathname":"/confidential-cloud/confidential-computing/cloud-service-providers","siteSpaceId":"sitesp_jX8zB","description":"Last Update: July 2023","breadcrumbs":[{"label":"Confidential Computing"}]},{"id":"Smcb4k1g3iKHOaKKgKwi","title":"Intel SGX","pathname":"/confidential-cloud/technology-in-depth/intel-sgx","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"}]},{"id":"ewSvEBcMqYHENcY60koA","title":"Getting Started","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/getting-started","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"}]},{"id":"Xic4O6xEcTephL0qpCGT","title":"Bare Metal Server Installation","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/getting-started/manual","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Getting Started"}]},{"id":"rVHRBrZYPvUCfeKxHToe","title":"Enclave Development Environment","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/getting-started/getting-started","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Getting Started"}]},{"id":"inywsRR1qW0E3Q93glt0","title":"Intel SGX SDK Setup","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/getting-started/intel-sgx-sdk-setup","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Getting Started"}]},{"id":"Wtk9vSOqnplCRw1elGO6","title":"Technology","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"}]},{"id":"wwFid74MmCuLN3AeMlp5","title":"Features","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/features","siteSpaceId":"sitesp_jX8zB","emoji":"1f3ad","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"}]},{"id":"IXt5COiB95ifkZPjHWuQ","title":"Threat Model","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/threat-model","siteSpaceId":"sitesp_jX8zB","emoji":"1f482","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"}]},{"id":"r3av9ofDWVVnG0pq84uj","title":"Versions","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/sgxv1-vs-sgxv2","siteSpaceId":"sitesp_jX8zB","emoji":"1f19a","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"}]},{"id":"LGoKehipJ1VBIRhVcXFs","title":"Concepts","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/concepts","siteSpaceId":"sitesp_jX8zB","emoji":"1f7e6","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"}]},{"id":"DsaLIFUrrk6BcWy14hlq","title":"Memory Encryption","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/concepts/enclaves","siteSpaceId":"sitesp_jX8zB","emoji":"1f3e6","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"},{"label":"Concepts","emoji":"1f7e6"}]},{"id":"hMxCfv6NWMkh7bFg1IK9","title":"Local and Remote Attestation","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/concepts/local-and-remote-attestation","siteSpaceId":"sitesp_jX8zB","emoji":"1f46e","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"},{"label":"Concepts","emoji":"1f7e6"}]},{"id":"pInEhTnQxcVNug4mIV15","title":"DCAP-Attestation Framework","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/concepts/dcap-attestation-framework","siteSpaceId":"sitesp_jX8zB","emoji":"1f5bc","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"},{"label":"Concepts","emoji":"1f7e6"}]},{"id":"N6ytunLXmNW0qu5rV593","title":"Secret Key Provisioning","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/technology/concepts/secret-key-provisioning","siteSpaceId":"sitesp_jX8zB","emoji":"1f511","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Technology"},{"label":"Concepts","emoji":"1f7e6"}]},{"id":"htgkrOde0kCyzvnfqzAR","title":"enclaive Development Kit","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"}]},{"id":"g0fiFAcLJXruyMxXAwQf","title":"Architecture","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/architecture","siteSpaceId":"sitesp_jX8zB","emoji":"1f3e2","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"}]},{"id":"yjekpTPLPBB0Z851R2Zp","title":"Workflow","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/workflow","siteSpaceId":"sitesp_jX8zB","emoji":"1f32a","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"}]},{"id":"Wi7fC2OB3pYFHJuqgqdC","title":"Tutorials","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/use-cases","siteSpaceId":"sitesp_jX8zB","emoji":"1f30d","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"}]},{"id":"fnEn50k1zUptxDILFMUZ","title":"Azure DCdsv3, DCsv2, or DCsv3 Setup","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/use-cases/azure","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"},{"label":"Tutorials","emoji":"1f30d"}]},{"id":"Wn7AngGdMteJuY3tTgwP","title":"Redis in cK8s","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/use-cases/redis","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"},{"label":"Tutorials","emoji":"1f30d"}]},{"id":"p5652RmL7kXcrs1GgJa5","title":"MongoDB in cK8s","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/use-cases/mongodb-in-ck8s","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"},{"label":"Tutorials","emoji":"1f30d"}]},{"id":"xeXE5W4C6Xq3WkP5Lq0p","title":"K8s + HashiCorp Vault on Azure DCsv3","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/enclaive-development-kit/use-cases/kubernetes","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"enclaive Development Kit"},{"label":"Tutorials","emoji":"1f30d"}]},{"id":"d6ztNv3nIgFmtgJlIIcT","title":"Vault Remote Attestation Plug-In","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/vault-remote-attestation-plug-in","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"}]},{"id":"wjlSwiAdSrJ5oQCLkP8d","title":"Initialization","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/vault-remote-attestation-plug-in/initialization","siteSpaceId":"sitesp_jX8zB","emoji":"1f3c3-2642","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Vault Remote Attestation Plug-In"}]},{"id":"3uHXxasRZNcbJT5mEEd0","title":"Attestation","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/vault-remote-attestation-plug-in/attestation","siteSpaceId":"sitesp_jX8zB","emoji":"1f46e","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Vault Remote Attestation Plug-In"}]},{"id":"Qdw5JHNLFAvazcZjwZYG","title":"Configuration","pathname":"/confidential-cloud/technology-in-depth/intel-sgx/vault-remote-attestation-plug-in/configuration","siteSpaceId":"sitesp_jX8zB","emoji":"2699","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel SGX"},{"label":"Vault Remote Attestation Plug-In"}]},{"id":"3KUWplapxmQ4VwYyNE0o","title":"Intel TDX","pathname":"/confidential-cloud/technology-in-depth/intel-tdx","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"}]},{"id":"2DTTNpzwYJb3T3SYQDeU","title":"Getting Started","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/getting-started","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"}]},{"id":"zYWjFKBBSIT6fyGElyuV","title":"Azure","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/getting-started/azure","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Getting Started"}]},{"id":"AJ8OrV2ckh18qAOHXYDW","title":"AWS","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/getting-started/aws","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Getting Started"}]},{"id":"TPqmpzgEulqdifSPhXQp","title":"GCP","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/getting-started/gcp","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Getting Started"}]},{"id":"xbimYe59rYEMMoWSDZ7G","title":"Technology","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"}]},{"id":"VhmAdbCPHV4HW78t2HA9","title":"History","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/history","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"}]},{"id":"vcGaNuHcm0IqPOrC2MOL","title":"VT","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/history/vt","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"History"}]},{"id":"pPbmlR7ou39vXHH8buBd","title":"TME/MKTME","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/history/tme-mktme","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"History"}]},{"id":"mNEEZd7ykx454Sb3qgKC","title":"SGX","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/history/sgx","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"History"}]},{"id":"qH96o6pI7v9qBXOF6lzV","title":"Features","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/features","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"}]},{"id":"0KwgsCw13qsy7bXdZqU5","title":"Threat Model","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/threat-model","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"}]},{"id":"6Wwnl9nCuFK1mLuKEJHm","title":"Concepts","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"}]},{"id":"xfC1588UDhUug7U1Jf5W","title":"Architecture","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/architecture","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"}]},{"id":"dISPeoie3mXQ5LajTHVj","title":"TDX Module","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/architecture/tdx-module","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"Architecture"}]},{"id":"0vcN01iTPuiJy4APNdDH","title":"Memory Encryption","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/memory-encryption","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"}]},{"id":"0g756uvLB0uXpG6BRFSQ","title":"Confidentiality and Integrity","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/memory-encryption/confidentiality-and-integrity","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"Memory Encryption"}]},{"id":"ManZwAaufZBcfrVjB2Me","title":"Keys and Key Management","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/memory-encryption/keys-and-key-management","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"Memory Encryption"}]},{"id":"dEnJ3f3DZBmxv5Ts4T0N","title":"TD Partitioning","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/td-partitioning","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"}]},{"id":"5KakJnDLCjWf3mnPwPOC","title":"DCAP-Attestation","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/dcap-attestation","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"}]},{"id":"aWzh3LLntIRXjvWW6SJR","title":"Overview","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/dcap-attestation/overview","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"DCAP-Attestation"}]},{"id":"o9RrnkUcwPsiEONELCMw","title":"Platform Registration","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/dcap-attestation/platform-registration","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"DCAP-Attestation"}]},{"id":"LG2zbJ83Yya5p6TJ5YHZ","title":"Attestation Report","pathname":"/confidential-cloud/technology-in-depth/intel-tdx/technology/fundamentals/dcap-attestation/attestation-report","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"Intel TDX"},{"label":"Technology"},{"label":"Concepts"},{"label":"DCAP-Attestation"}]},{"id":"EiSoM04qykLWZcLP3wFJ","title":"AMD SEV","pathname":"/confidential-cloud/technology-in-depth/amd-sev","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"}]},{"id":"HOk0Emqpq4rsYJqFTARf","title":"Getting Started","pathname":"/confidential-cloud/technology-in-depth/amd-sev/getting-started","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"}]},{"id":"ORaJnfBvTpz99vJZDe8Q","title":"Azure","pathname":"/confidential-cloud/technology-in-depth/amd-sev/getting-started/azure","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Getting Started"}]},{"id":"Ioi0NieGRc5Bga1S49lS","title":"AWS","pathname":"/confidential-cloud/technology-in-depth/amd-sev/getting-started/aws","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Getting Started"}]},{"id":"AHRfE1AexnYltF0B6Jq0","title":"GCP","pathname":"/confidential-cloud/technology-in-depth/amd-sev/getting-started/gcp","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Getting Started"}]},{"id":"thHuijMdBHn0979139gU","title":"Technology","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"}]},{"id":"enP5YkpHsiRCNHydvsPa","title":"History","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/features","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"}]},{"id":"VolvTRuy6rJhgRs7aVnh","title":"Threat Model","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/threat-model","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"}]},{"id":"3WLn4TW30zHZEcFSJhr3","title":"SME Concepts","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/sme-concepts","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"}]},{"id":"zsI9Lrie72GjTJyjXGyT","title":"Use Models","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/sme-concepts/use-models","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SME Concepts"}]},{"id":"Y9prv2CCvfwxFXAuMffV","title":"SEV-SNP Concepts","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"}]},{"id":"KN0xvXuYGYn2TL4whT2y","title":"Features","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"}]},{"id":"YWHfqIr8K6igNDdEKfxT","title":"Integrity Threats","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/integrity-threats","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"O9TAZkQLIQbvdWsMch1J","title":"Reverse Map Table","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/reverse-map-table","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"FGnXl9qEJu9mSFkmLJed","title":"Page Validation","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/page-validation","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"aEivIN4oeo6huFJAEiCI","title":"Page States","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/page-states","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"OvY99Rp83FjzI163KW0H","title":"Virtual Machine Privilege Levels","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/virtual-machine-privilege-levels","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"57GezZ2tQpocZpFG2oIZ","title":"Interrupt/Exception Protection","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/interrupt-exception-protection","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"PW2O5HVAwr43gihpBt1x","title":"Trusted Platform Information","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/trusted-platform-information","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"ABW0gYqfcb85Mc0OnZ2I","title":"TCB Versioning","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/tcb-versioning","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"V3ETE61MAXFtQ4MGZz91","title":"VM Launch & Attestation","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/vm-launch-and-attestation","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"1xSlM590ukBSNNfyMQQw","title":"VM Migration","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/vm-migration","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"k1zaUaxQdZbAtjwE3PbO","title":"Side Channels","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/features/side-channels","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Features"}]},{"id":"xoRzfRoC54Is3Eh5Sr0x","title":"Use Cases","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/use-cases","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"}]},{"id":"bJyZwbgl0LHnsf3OIsBT","title":"Architecture","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/architecture","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"}]},{"id":"7y2BCtiqhUL6nku28OlT","title":"Encrypted Memory","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/architecture/encrypted-memory","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Architecture"}]},{"id":"rdwtyrZNwwH5yBpVekw8","title":"Key Management","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/architecture/key-management","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"},{"label":"Architecture"}]},{"id":"6790v2nPupFvx2P6dBQy","title":"Software Implications","pathname":"/confidential-cloud/technology-in-depth/amd-sev/technology/fundamentals/software-implications","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"AMD SEV"},{"label":"Technology"},{"label":"SEV-SNP Concepts"}]},{"id":"3e7tw4HZroJF2EDxfmxp","title":"ARM CC","pathname":"/confidential-cloud/technology-in-depth/arm-cc","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"}]},{"id":"BaeHUlmEAnmG8vFIPgwG","title":"Technology","pathname":"/confidential-cloud/technology-in-depth/arm-cc/technology","siteSpaceId":"sitesp_jX8zB","description":"","breadcrumbs":[{"label":"Technology in depth"},{"label":"ARM CC"}]},{"id":"VS9G478NIzFzP4tfv10b","title":"Introduction","pathname":"/confidential-cloud/technology-in-depth/arm-cc/technology/introduction","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"ARM CC"},{"label":"Technology"}]},{"id":"f2iTiEVx8TEaEB9NoDwB","title":"Threat Model","pathname":"/confidential-cloud/technology-in-depth/arm-cc/technology/threat-model","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"ARM CC"},{"label":"Technology"}]},{"id":"YadclfGxJ3JXXJRoK8ga","title":"Design","pathname":"/confidential-cloud/technology-in-depth/arm-cc/technology/design","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"ARM CC"},{"label":"Technology"}]},{"id":"1XOqwhCvmxknjPcdFfKb","title":"Comparison","pathname":"/confidential-cloud/technology-in-depth/arm-cc/technology/comparison","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"ARM CC"},{"label":"Technology"}]},{"id":"MPE8Zh3o1X4DzYnctiNV","title":"Attestation Methods","pathname":"/confidential-cloud/technology-in-depth/attestation-methods","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"}]},{"id":"kTBx1WATVm2EIhAoYGYd","title":"Raw Attestation","pathname":"/confidential-cloud/technology-in-depth/attestation-methods/raw-attestation","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Attestation Methods"}]},{"id":"uv2faUdBe5a5Rhwh7csC","title":"Raw Attestation with Secure-Boot","pathname":"/confidential-cloud/technology-in-depth/attestation-methods/raw-attestation-with-secure-boot","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Attestation Methods"}]},{"id":"zK9F3MxvpntUmEXN5iWh","title":"Raw Attestation with a vTPM","pathname":"/confidential-cloud/technology-in-depth/attestation-methods/raw-attestation-with-a-vtpm","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Attestation Methods"}]},{"id":"JssbasUrf7ZDiL6rMbIw","title":"AMD Secure VM Service Module and vTPMs","pathname":"/confidential-cloud/technology-in-depth/attestation-methods/raw-attestation-with-a-vtpm/amd-secure-vm-service-module-and-vtpms","siteSpaceId":"sitesp_jX8zB","description":"In this article we summarise the concept of vTPM-based attestation leveraging the Secure Virtual Machine Service provided by AMD SEV technology.","breadcrumbs":[{"label":"Technology in depth"},{"label":"Attestation Methods"},{"label":"Raw Attestation with a vTPM"}]},{"id":"sAZZM4W8kE2lZKJVhQw0","title":"Raw Attestation with paravirtualized TPM","pathname":"/confidential-cloud/technology-in-depth/attestation-methods/raw-attestation-with-paravirtualized-tpm","siteSpaceId":"sitesp_jX8zB","breadcrumbs":[{"label":"Technology in depth"},{"label":"Attestation Methods"}]},{"id":"4IvUp3k2q0YtZOh8mM3M","title":"Attestation Azure, GCP and AWS really implement","pathname":"/confidential-cloud/attestation-azure-gcp-and-aws-really-implement","siteSpaceId":"sitesp_jX8zB","description":"We examine AMD's attestation report specification and assess how closely Azure, GCP, and AWS adhere to it."}]}