Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox


 

Intel® Trust Domain Extensions (Intel® TDX)

Isolation, confidentiality, and integrity at the virtual machine (VM) level.

  • Overview
  • Documentation

What is Intel TDX?

Intel® Trust Domain Extensions (Intel® TDX) is Intel's newest confidential computing technology. This hardware-based trusted execution environment (TEE) facilitates the deployment of trust domains (TD), which are hardware-isolated virtual machines (VM) designed to protect sensitive data and applications from unauthorized access.

A CPU-measured Intel TDX module enables Intel TDX. This software module runs in a new CPU Secure Arbitration Mode (SEAM) as a peer virtual machine manager (VMM), and supports TD entry and exit using the existing virtualization infrastructure. The module is hosted in a reserved memory space identified by the SEAM Range Register (SEAMRR). 

Intel TDX uses hardware extensions for managing and encrypting memory and protects both the confidentiality and integrity of the TD CPU state from non-SEAM mode. 

Intel TDX uses architectural elements such as SEAM, a shared bit in Guest Physical Address (GPA), secure Extended Page Table (EPT), physical-address-metadata table, Intel® Total Memory Encryption – Multi-Key (Intel® TME-MK), and remote attestation.

Intel TDX ensures data integrity, confidentiality, and authenticity, which empowers engineers and tech professionals to create and maintain secure systems, enhancing trust in virtualized environments.
 

Get Started

Key Benefits

The ideal choice to enhance security in virtualized environments.

Isolation

Hardware-level VM isolation for robust data protection against unauthorized access ensures confidentiality and integrity of your data.

Confidentiality

Unauthorized or altered software is prohibited from loading and accessing confidential data. Data in memory is opaque to cloud service providers (CSP) or operators and shared applications.

Integrity

Attestation confirms that hardware and software configurations and policies are as expected and provides assurance to the workload owner that the server is trustworthy.

 

 

Protect sensitive data and intellectual property (IP).
Ease of Use

Streamline your workflow by supporting the lift and shift of virtual machines and existing code. Migrate your applications without any modifications for a seamless and trouble-free experience.

Optimized Performance

Reduce reliance on complex software stacks for faster response times and increased overall performance.

Use Cases

Employ Intel TDX technology across a variety of use cases to enhance security, privacy, and performance. 

Data Security and IP Protection

Protect apps and data from attack, tampering, or theft.

Privacy and Compliance

Strengthen data confidentiality and regulatory compliance.

Data Sovereignty and Control

Prohibit access by cloud providers or other tenants. Add safeguards to data sovereignty and governance.

Confidential AI

Safeguard your AI data and models by providing robust isolation, integrity, and confidentiality.

Get Started with Intel TDX

Intel TDX technology is currently available in:

 

 

Alibaba Cloud*

Build an Intel TDX confidential computing environment on Alibaba Cloud* infrastructure.

Go to Alibaba


 

Intel® Developer Cloud

Experience optimized deployment environments with the latest Intel processors and performance-optimized software stacks.

Explore Intel® Developer Cloud


 

Microsoft Azure*

Harness the power of Intel TDX on Microsoft Azure*, a flexible and scalable cloud computing platform designed for secure and efficient operations.

Go to Azure


 

Google Cloud*

Use Intel TDX on this robust cloud infrastructure that offers advanced data protection and seamless integration with your existing systems.
 

 

 

Go to Google Cloud


 

Explore Intel's Confidential Computing Portfolio

Help secure and isolate your most sensitive data, AI, or model assets with hardware-enhanced memory encryption using Intel’s confidential computing technologies such as:

  • Intel® Trust Authority—a zero trust attestation SaaS service
  • Intel® Software Guard Extensions (Intel® SGX)—for the smallest trust boundary and software attack surface protection

 

Learn More

 

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo