⬤ ⬤ ⬤$ enclaver build \
-f enclaver.yaml
Tagged example/enclave:v1
$ enclaver run example/enclave:v1
Starting egress proxy on vsock port 17002
Started enclave i-00e43bfc030dd8469-enc1840fa584262e1a
Connected to enclave, starting log stream
Starting "python -m flask run --host=0.0.0.0 --port=8001"
* Serving Flask app "/opt/app/server.py"
Enclaves provide several critical features for operating software which processes sensitive data, including:
Isolation: Enclaves guarantee that sensitive data inserted, processed or decrypted can never be read by an attacker and leave the enclave.
Attestation: Enclaves make it possible to determine the exact identity and configuration of software running in an enclave.
Network Restrictions: External communication is limited and controlled. The network policy is built into the image and therefore the software attestation.
Enclaver currently supports AWS Nitro Enclaves, with more coming in the future.
Icons from: DEB File by Arthur Shlain from Noun Project • RPM File by Arthur Shlain from Noun Project