# Nitride

{% hint style="info" %}
This documentation is a work in progress and subject to updates and revisions. Keep an eye out for version changes and new additions to ensure you have the latest information.
{% endhint %}

Nitride is a tool for workload identity management and the gateway to confidential computing. The goal of workload identity is to ensure that  individual workload (such as a virtual machine, container, or serverless function) has its own unique identity, and access permissions are granted based on the principle of least privilege.

<figure><img src="https://3910105610-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FB6wCdvkxdUdtHHcfqQVl%2Fuploads%2FWPTLLPJUNDXZqiUTnHDF%2Fnitride-infographic.png?alt=media&#x26;token=03fef85e-37bc-4432-aa95-53a9c4bdc668" alt="" width="375"><figcaption></figcaption></figure>

In today's complex cloud setups, managing access to a wide array of sensitive information is crucial. From database passwords to API keys for external services, keeping track of which workload accesses what data can be challenging, especially across various platforms. By harnessing the power of confidential computing, Nitride provides cryptographic proof of a workload's identity. Picture it like a TLS certificate for your workload, but issued by the processor itself acting as a trustful notary. Nitride enables the verification of workload identities and the implementation of detailed access controls for secrets stored in Key Management Services like Vault.

## Features

<table data-view="cards"><thead><tr><th></th></tr></thead><tbody><tr><td>AMD, Intel, ARM and NVIDIA GPU platform support</td></tr><tr><td>AWS, Azure, GCP and many other cloud provider integration</td></tr><tr><td>Local, remote and run-time workload attestation</td></tr><tr><td>Policy-based attestation verification</td></tr><tr><td>Quantum Enclave ready</td></tr><tr><td>#PKCS HSM integration for FIPS compliance</td></tr></tbody></table>

## Getting Started

{% content-ref url="documentation" %}
[documentation](https://docs.enclaive.cloud/nitride/documentation)
{% endcontent-ref %}

{% content-ref url="tutorials" %}
[tutorials](https://docs.enclaive.cloud/nitride/tutorials)
{% endcontent-ref %}

## Learn more

<table data-card-size="large" data-view="cards"><thead><tr><th data-type="content-ref"></th><th></th></tr></thead><tbody><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/mzjpiPnGVwTaHdGYte2r/">Enclaive Multi Cloud Platform</a></td><td>Confidential Multi Cloud Platform</td></tr><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/GWxadkt9sLLUyKVhuNB7/">Virtual HSM</a></td><td>Hardware graded key and workload identity management</td></tr><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/ZAOyClhisJhRvjIxLjXP/">Vault</a></td><td>Key and Identity Access Management</td></tr><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/JCiJp92CK5rDzO9DECIa/">Buckypaper</a></td><td>Confidential Virtualization</td></tr><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/2TGGyMVhS5NRcNQJhHpN/">Dyneemes</a></td><td>Confidential Kubernetes</td></tr><tr><td><a href="https://app.gitbook.com/o/u3yTMU8vRj5QnT6MPkEF/s/sGDt7oDAVwKSqYFvdscm/">Morphism</a></td><td>Confidential Serverless Containers</td></tr></tbody></table>
