Intel® Trust Authority
Data is one of your most valuable assets. Trust the systems that run it.
Zero Trust Attestation Service Without High Cost or Complexity
Intel Trust Authority is a zero-trust attestation service that provide customers with assurance that their apps and data are protected on the platform of their choice, including multiple cloud, sovereign clouds, edge, and on-premises environments.
Intel Trust Authority verifies the trustworthiness of compute assets including infrastructure, data, applications, endpoints, workloads including AL/ML, identities, and more. This attests to the validity of Intel Confidential Computing environments, also known as Trusted Execution Environments (TEEs), Graphical Processing Units (GPUs), and Trusted Platform Modules (TPMs).
Learn more about the full portfolio of Intel® Tiber™ Trust Services.
Get Started
Simplify the security and trust ability of the platform on which your workload runs with Intel's infrastructure-agnostic attestation services.
Start a 30-Day Free Trial
Find out how Intel Trust Authority can help you migrate to the cloud while remaining in control of confidential and regulated data.
Contact a Consultant
Get the conversation started with an Intel representative to discuss the best attestation deployment for your unique needs.
ISO
27001:2022 certified
Certified for Information Security, Cybersecurity, & Privacy Protection
Put Zero Trust within reach and get public cloud flexibility with private cloud security, wherever your workloads run—on-prem, hybrid, multi-cloud, and the edge. Learn about Intel Trust Authority’s independent attestation.
Benefits
Independent
Verify the trustworthiness of the environment, regardless of who manages the data center. Address increasing demand for separation of duties between the cloud infrastructure provider and the verifier of the infrastructure’s authenticity and integrity.
Scalable
Scale your workloads across on-premises, edge, multiple cloud, or hybrid deployments with a single, consistent attestation service that is rooted in the silicon.
Easy to Deploy
Easily set, monitor, and verify security policies across multiple cloud environments and improve operational efficiency without the cost and complexity of building your own attestation service.
Intel Trust Authority supports attestation for Intel and non-Intel Confidential Computing, GPUs, and TPMs.
Intel Trust Authority has achieved ISO 27001:2022 certification. The attestation service is committed to delivering best practices in security controls, information technology and cybersecurity to our clients and their customers.
Intel Trust Authority Use Cases
Securing AI with Zero Trust
Security is a priority for every company developing AI, and challenges abound. Whether it's IP theft of sensitive models, privacy breaches, or outright espionage, protecting your tech stack is critical.
Confidential computing powered by Intel helps you reduce your attack surface, prevent IP theft of sensitive models, and protect privacy during model training, fine tuning, and inferencing. With Intel® Trust Authority, you can establish trust in multi-party collaboration for AI, and protect workloads and verify their integrity in real time.
Protect Confidential Blockchain Transaction Information
Stay compliant with financial industry regulations, and build trust with blockchain users by protecting against unauthorized access and tampering.
Get blockchain-based smart contracts and confidential contracts information encrypted by Intel hardware, and real-time integrity verification by Intel® Trust Authority.
Reduce Risk And Costs By Securely Migrating Payments to the Cloud
Intel can help you reach your goals of ensuring secure payment processing while reducing expenses and the need for support and maintenance by migrating your payment processing to the cloud. Hardware-backed encryption with Intel® Confidential Computing Solutions protects data in use. Intel® Trust Authority provides third-party verification of compute used to process payments.
Collaborate While Protecting IP
Federated learning lets you train AI models with decentralized data to reduce the risk of exposing model IP. Models aren’t exposed outside a Trusted Execution Environment (TEE) and each party's infrastructure is independently attested and verified for integrity by Intel® Trust Authority.
This strengthens your ability to stay compliant with GDPR, HIPAA, and other regulatory frameworks, and eases deployment from edge to cloud. Plus, reduce security risks with end-to-end data encryption and independent oversight.
Case Studies
For reference, please see the Performance Index in the 4th Gen Xeon page.
Learn More
What Is a Trusted Execution Environment?
Discover how Trust Execution Environments help create secure areas within processors to protect your sensitive data and enhance security for applications like financial transactions and personal data protection. Watch now to see Intel's innovative implementation of Trust Execution Environments and their benefits helps in creating a more secure computing environment.
Intel and NVIDIA are providing a unified attestation solution for customers to verify the trustworthiness of the CPU and GPU Trusted Execution Environments (TEEs) for Confidential Computing based on Intel® Xeon® processors with Intel® Trust Domain Extensions (Intel TDX) and NVIDIA Tensorcore H100 GPUs.
What Others Are Saying
"With innovations across security, Intel will enable Azure customers using VMs based on Intel® SGX technology or Intel® TDX technology to have a choice for their attestation verifiers with a new service that attests to the provenance of the Confidential Computing environment with Intel® Trust Authority."
Mark Russinovich
Fellow and CTO
"Noname Security solves the superhuman problem of API security in the cloud and on premises and we do it with the help of Intel® Trust Authority to attest that the cloud VM is equipped with genuine confidential computing encryption enabled processors.”
Ryan Bagnulo
Technical Director, Strategic Solution Architectures
“Our collaboration enables security conscious organizations to share data safely end-to-end while preserving privacy, confidentiality, and compliance with regulatory requirements. Confidential computing is especially important for highly regulated industries where data security is paramount to safeguarding the privacy of the information.”
Todd Moore
Vice President of Data Security Products
“Zero Trust gives organizations the ability to operate more securely in IT environments where they can't verify directly that users, devices, or network infrastructure are secure and who/what they claim they are. Intel® Trust Authority takes that security one step further and verifies the computation path from apps to silicon can be trusted. With Confidential Computing and attestation services powered by Intel, we are entering the era of Zero Trust Silicon to Cloud.”
Ken Urquhart
Global Vice President of 5G Strategy
"In a world where protecting our assets on all levels is paramount, confidential compute technology one of the elements in our protection shield. The most crucial piece of the puzzle? Independent attestation. That's precisely what Intel Trust Authority delivers. It's a must-go scenario."
Jonas De Troy
Head of Public Cloud and Edge
Expert Insight
Frequently Asked Questions
Confidential computing is an approach focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.
At the core of confidential computing is an isolated, hardware-based Trusted Execution Environment (TEE) where trusted software can access confidential data. Data is only released to the TEE for decryption & processing when authorized by the owner's key. The TEE can be verified through a process called attestation, which helps assure users their TEE is genuine and correctly configured.
A trusted execution environment (TEE) is a secure area of a main processor. It protects code and data loaded inside with respect to confidentiality and integrity. Data integrity—prevents unauthorized entities from altering data when any entity outside the TEE processes data, Code integrity—the code in the TEE cannot be replaced or modified by unauthorized entities.
Attestation of a Trusted Execution Environment (TEE) is the dynamic measuring of the health of the isolated execution technology and is based on building a trust chain from the manufacturer to the last power cycle of the device.
Intel Trust Authority is a suite of trust and security services. It provides our customers assurance that their apps and data are protected on the platform of their choice, including multiple cloud, edge and on-premises environments.
In its first release, Intel Trust Authority takes Confidential Computing to the next level with a Zero Trust attestation SaaS that verifies the trustworthiness of compute assets at the network, edge, and in the cloud. Intel Trust Authority attests to the validity of Intel Confidential Computing environments, also known as Trusted Execution Environments (TEEs).
Get started with these steps:
- Contact Intel via www.intel.com/trustauthority or via the Azure Marketplace to subscribe to the service and obtain API keys.
- Download and integrate Intel Trust Authority agent into your workload.
- Request an Intel Confidential Computing (TEE) instance in the cloud.
- The attestation service verifies the TEE against customer defined policies.
- The workload executes in the cloud after Intel Trust Authority service provides an attestation verification token for the TEE.
Intel Trust Authority offers an operator-independent attestation service that helps provide end users confidence that the TEE provided by the CSP is trustworthy. End users can encrypt their application and not release the decryption key, nor decrypt it until the attestation token is received. End users can maintain their own KMS on-prem or depend on CSP provided key vaults such as Azure Key Vault to manage these encryption and decryption keys. Therefore, KMS is an integral part of the customer solution and Intel Trust Authority is designed to interoperate with it.
Intel followed its Security Development Lifecycle (SDL) when developing Intel Trust Authority. Before we deliver products to our customers, we apply rigorous testing and offensive research, scouring code for potential security vulnerabilities. But we don’t stop with our own assessment. We work with the best in the business—whether that’s a top university, a major technology vendor, or even a group of elite hackers to put our products to the test.
Intel Trust Authority has achieved ISO 27001:2022 certification. The Confidential Computing attestation service is committed to delivering best practices in security controls, information technology and cybersecurity to our clients and their customers. For more information: https://www.intel.com/content/www/us/en/quality/corporate-certifications/directory.html.
Contact Us
Connect with an Intel representative today to discuss solutions for your business, to set up a demo, or to get started.