Open Source Confidential Computing Platform

Secure Your CI/CD Pipeline with Confidential Computing

Deploy unmodified Docker applications to hardware-verified Intel TDX enclaves. Every workload runs in a Trusted Execution Environment with remote attestation, memory encryption, and cryptographic proof of integrity.

TDX Intel Trust Domain Extensions
Zero Trust Hardware-Rooted Attestation
No Secrets GitHub OIDC Authentication

Hardware Isolation

Every workload runs inside an Intel TDX virtual machine with encrypted memory that even the hypervisor cannot read.

Remote Attestation

Cryptographic proof from Intel hardware that your code is running unmodified in a genuine TDX enclave before any secrets are released.

Unmodified Docker

Bring your existing Docker images. No SDK, no code changes, no special toolchains. If it runs in Docker, it runs in a TDX enclave.

How It Works

From code commit to verified enclave deployment in four steps.

1

Register Application

Define your app with its Docker image reference, expected measurements, and the GitHub organization authorized to deploy it.

2

Publish Version

Push your container image to a registry. DevOps Defender records the content digest as the expected image measurement for attestation.

3

Measure Enclave

The TDX hardware generates a cryptographic attestation quote binding the VM identity, firmware, kernel, and rootfs into a verifiable measurement chain.

4

Deploy to TDX

Your Docker container launches inside the verified TDX enclave. The control plane monitors health via heartbeats and enforces attestation continuously.

Architecture

A one-way trust model where every component runs inside a Trusted Execution Environment.

Client Layer
GitHub Actions OIDC Token Issuer
CLI / SDK Deploy Commands
HTTPS / OIDC JWT
Edge Layer
Cloudflare Tunnel TLS Termination / DDoS Protection
Cloudflare Tunnel (encrypted)
Control Plane
TDX Enclave
Control Plane API Agent Registry / Attestation Verifier / Deploy Orchestrator
Mutual Attestation / Heartbeat
Agent Layer
TDX Enclave
Agent + Workload Your Docker Container
TDX Enclave
Agent + Workload Your Docker Container
TDX Enclave
Agent + Workload Your Docker Container

One-Way Trust Model

Trust flows from hardware to software. Each layer verifies the one below it, never the reverse.

Trust Anchor What It Proves Mechanism
Intel CPU Hardware is genuine TDX-capable silicon Intel Attestation Service certificate chain
TDX Module VM memory is encrypted and isolated SEAM module measurement in MRTD
Firmware / Kernel Boot chain is unmodified RTMR[0] and RTMR[1] measurements
dm-verity rootfs Filesystem integrity is intact RTMR[2] contains verity root hash
Application Correct container image is running RTMR[3] extends with image digest

Trusted Execution Environments

Intel TDX provides hardware-enforced isolation for entire virtual machines, not just application enclaves.

Hardware Memory Encryption

Intel TDX encrypts all VM memory with AES-256-XTS using per-TD keys managed entirely in hardware. The hypervisor, other VMs, and even physical memory probes cannot access your data.

  • Per-VM encryption keys generated by CPU microcode
  • Keys never exposed to software, including firmware
  • Integrity protection against memory replay attacks
  • Full VM isolation, not just process-level

Remote Attestation

Before releasing any secrets, verify the enclave is genuine. The TDX quote contains cryptographic measurements of the entire software stack, signed by Intel-provisioned keys.

  • MRTD: Measures the initial TD configuration and firmware
  • RTMR[0-1]: Firmware and kernel boot chain
  • RTMR[2]: dm-verity root filesystem hash
  • RTMR[3]: Application-level measurements

Unmodified Docker Apps

Unlike SGX enclaves that require a specialized SDK, TDX protects entire VMs. Your Docker containers run without any code changes inside a confidential virtual machine.

  • Standard OCI container images, any base image
  • No SDK or library dependencies required
  • Full Linux environment inside the enclave
  • Podman container runtime for rootless execution

Measured Boot Chain

Every component in the boot sequence is measured into TDX runtime measurement registers before execution, creating an unforgeable chain of trust from CPU silicon to your application.

  • OVMF firmware measured by TDX module into MRTD
  • Kernel and initramfs measured into RTMR[0]
  • dm-verity rootfs integrity measured into RTMR[2]
  • Application identity extended into RTMR[3]

Defense in Depth

Multiple independent security layers ensure that a compromise of any single component does not breach the system.

Nonce Challenge Protocol

Every attestation request includes a unique server-generated nonce bound to the TDX quote's report data field. This prevents replay attacks and ensures freshness of every attestation.

dm-verity Root Filesystem

The agent VM boots with a read-only root filesystem protected by dm-verity. Any modification to the filesystem causes I/O errors, making persistent rootkits impossible.

TCB Enforcement

The Trusted Computing Base is pinned to specific versions. The control plane rejects agents whose firmware, kernel, or TDX module versions do not match the expected TCB.

Continuous Monitoring

Agents send periodic heartbeats with fresh attestation evidence. If an agent fails to attest or measurements drift, it is immediately quarantined from the fleet.

Cloudflare Tunnel Isolation

Each agent receives a scoped Cloudflare tunnel token during registration. Traffic never traverses the open internet; all communication is encrypted end-to-end through Cloudflare's network.

Ownership via Label Matching

Agents are labeled with their GitHub organization. Deploy requests are authorized by matching the OIDC token's repository owner claim against the agent's ownership label. No shared secrets, no API keys.

Deploy with GitHub OIDC

No API keys. No shared secrets. Deploy directly from GitHub Actions using OpenID Connect tokens.

1

GitHub Issues a JWT

Your GitHub Actions workflow requests an OIDC token from GitHub's token endpoint. This JWT contains claims about the repository, organization, branch, and workflow that triggered the deployment.

2

Control Plane Verifies the Token

DevOps Defender validates the JWT signature against GitHub's JWKS endpoint, checks the audience claim, and extracts the repository_owner to determine which organization is deploying.

3

Ownership Match Authorizes Deploy

The control plane matches the JWT's repository_owner against agents labeled with github:org/<name>. Only agents owned by the deploying organization receive the workload.

4

Workload Deploys to Attested Agents

The container image is pulled and launched inside the TDX enclave. No secrets were exchanged, stored, or rotated. The entire auth flow is stateless and ephemeral.

.github/workflows/deploy.yml YAML
name: Deploy to DevOps Defender
on:
  push:
    branches: [main]

permissions:
  id-token: write
  contents: read

jobs:
  deploy:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Deploy to TDX enclave
        uses: devopsdefender/deploy-action@v1
        with:
          control-plane: https://devopsdefender.com
          app-name: my-application
          image: ghcr.io/myorg/myapp:${{ github.sha }}

Quick Start

Get your first workload running in a TDX enclave in minutes.

Step 1

Register Your Application

Register your app with the control plane. This defines the container image, expected measurements, and which GitHub organization is authorized to deploy.

Terminal
# Register a new application
curl -X POST https://devopsdefender.com/api/v1/apps \
  -H "Content-Type: application/json" \
  -d '{
    "name": "my-application",
    "image": "ghcr.io/myorg/myapp:latest",
    "owner": "github:org/myorg"
  }'
Step 2

Add the GitHub Action

Add the DevOps Defender deploy action to your workflow. The action handles OIDC token acquisition and deployment automatically.

.github/workflows/deploy.yml
permissions:
  id-token: write

steps:
  - name: Deploy
    uses: devopsdefender/deploy-action@v1
    with:
      control-plane: https://devopsdefender.com
      app-name: my-application
      image: ghcr.io/myorg/myapp:${{ github.sha }}
Step 3

Verify and Monitor

Check that your agent registered successfully and the workload is running inside a verified TDX enclave.

Terminal
# List registered agents
curl https://devopsdefender.com/api/v1/agents | jq

# Check agent attestation status
curl https://devopsdefender.com/api/v1/agents/{id} | jq '.registration_state'

# View agent logs
curl https://devopsdefender.com/api/v1/agents/{id}/logs

Ready to deploy with confidence?

DevOps Defender is open source. Inspect the code, audit the measurements, and verify the attestation yourself.