Intel® Trust Authority
Data is one of your most valuable assets. Trust the systems that run it.
US Partners
If you have a partnership with Intel and are based in the US, launch this partner portal
Europe Partners
If you have a partnership with Intel and are based in Europe, launch this partner portal
Zero Trust Attestation Service Without High Cost or Complexity
Intel Trust Authority is a suite of trust and security services that provides customers with assurance that their apps and data are protected on the platform of their choice, including multiple cloud, edge, and on-premises environments.
In its first release, Intel Trust Authority takes Confidential Computing to the next level with a Zero Trust attestation SaaS that verifies the trustworthiness of compute assets at the network, edge, and in the cloud. Intel Trust Authority attests to the validity of Intel Confidential Computing environments, also known as Trusted Execution Environments (TEEs).
Get Started
Simplify the security and trustability of your Confidential Computing workload with Intel’s cloud-agnostic attestation service.
Start a 30-Day Free Trial
Find out how Intel Trust Authority can help you migrate to the cloud while remaining in control of confidential and regulated data.
Contact a Consultant
Get the conversation started with an Intel representative to discuss the best attestation deployment for your unique needs.
ISO
27001:2022 certified
Certified for Information Security, Cybersecurity, & Privacy Protection
Put Zero Trust within reach and get public cloud flexibility with private cloud security, wherever your workloads run—on-prem, hybrid, multi-cloud, and the edge. Learn about Intel Trust Authority’s independent attestation.
Benefits
Independent
Verify the trustworthiness of the Confidential Computing environment, regardless of who manages the data center. Address increasing demand for separation of duties between the cloud infrastructure provider and the verifier of the infrastructure’s authenticity and integrity.
Scalable
Scale Confidential Computing across on-premises, edge, multiple cloud, or hybrid deployments with a single, consistent attestation service that is rooted in the silicon.
Easy to Deploy
Easily set, monitor, and verify security policies across multiple cloud environments and improve operational efficiency without the cost and complexity of building your own attestation service.
In its first generation, Intel Trust Authority supports Intel Confidential Computing.
Intel Trust Authority has achieved ISO 27001:2022 certification. The Confidential Computing attestation service is committed to delivering best practices in security controls, information technology and cybersecurity to our clients and their customers.
Case Studies
For reference, please see the Performance Index in the 4th Gen Xeon page.
Learn More
What Is a Trusted Execution Environment?
Learn how Intel® Trust Authority works with Intel-based Confidential Computing environments.
Intel Trust Authority Conversation with Anil Rao
Anil Rao, VP & GM at Intel, explains the concept and significance of Intel Trust Authority.
What Others Are Saying
"With innovations across security, Intel will enable Azure customers using VMs based on Intel® SGX technology or Intel® TDX technology to have a choice for their attestation verifiers with a new service that attests to the provenance of the Confidential Computing environment with Intel® Trust Authority."
Mark Russinovich
Fellow and CTO
“Particularly with growing adoption of machine learning, Privacy Enhancing Technologies such as Trusted Execution Environments, are becoming a critical element in protecting personal information and sensitive data from cyber threats. Leidos uses Intel® Trust Authority to further enhance the trustworthiness of Trusted Execution Environments.”
Srini Iyer
CTO
"Noname Security solves the superhuman problem of API security in the cloud and on premises and we do it with the help of Intel® Trust Authority to attest that the cloud VM is equipped with genuine confidential computing encryption enabled processors.”
Ryan Bagnulo
Technical Director, Strategic Solution Architectures
“Our collaboration enables security conscious organizations to share data safely end-to-end while preserving privacy, confidentiality, and compliance with regulatory requirements. Confidential computing is especially important for highly regulated industries where data security is paramount to safeguarding the privacy of the information.”
Todd Moore
Vice President of Data Security Products
“Zero Trust gives organizations the ability to operate more securely in IT environments where they can't verify directly that users, devices, or network infrastructure are secure and who/what they claim they are. Intel® Trust Authority takes that security one step further and verifies the computation path from apps to silicon can be trusted. With Confidential Computing and attestation services powered by Intel, we are entering the era of Zero Trust Silicon to Cloud.”
Ken Urquhart
Global Vice President of 5G Strategy
Expert Insight
Frequently Asked Questions
Confidential computing is an approach focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.
At the core of confidential computing is an isolated, hardware-based Trusted Execution Environment (TEE) where trusted software can access confidential data. Data is only released to the TEE for decryption & processing when authorized by the owner's key. The TEE can be verified through a process called attestation, which helps assure users their TEE is genuine and correctly configured.
A trusted execution environment (TEE) is a secure area of a main processor. It protects code and data loaded inside with respect to confidentiality and integrity. Data integrity—prevents unauthorized entities from altering data when any entity outside the TEE processes data, Code integrity—the code in the TEE cannot be replaced or modified by unauthorized entities.
Attestation of a Trusted Execution Environment (TEE) is the dynamic measuring of the health of the isolated execution technology and is based on building a trust chain from the manufacturer to the last power cycle of the device.
Intel Trust Authority is a suite of trust and security services. It provides our customers assurance that their apps and data are protected on the platform of their choice, including multiple cloud, edge and on-premises environments.
In its first release, Intel Trust Authority takes Confidential Computing to the next level with a Zero Trust attestation SaaS that verifies the trustworthiness of compute assets at the network, edge, and in the cloud. Intel Trust Authority attests to the validity of Intel Confidential Computing environments, also known as Trusted Execution Environments (TEEs).
Get started with these steps:
- Contact Intel via www.intel.com/trustauthority or via the Azure Marketplace to subscribe to the service and obtain API keys.
- Download and integrate Intel Trust Authority agent into your workload.
- Request an Intel Confidential Computing (TEE) instance in the cloud.
- The attestation service verifies the TEE against customer defined policies.
- The workload executes in the cloud after Intel Trust Authority service provides an attestation verification token for the TEE.
Intel Trust Authority offers an operator-independent attestation service that helps provide end users confidence that the TEE provided by the CSP is trustworthy. End users can encrypt their application and not release the decryption key, nor decrypt it until the attestation token is received. End users can maintain their own KMS on-prem or depend on CSP provided key vaults such as Azure Key Vault to manage these encryption and decryption keys. Therefore, KMS is an integral part of the customer solution and Intel Trust Authority is designed to interoperate with it.
Intel followed its Security Development Lifecycle (SDL) when developing Intel Trust Authority. Before we deliver products to our customers, we apply rigorous testing and offensive research, scouring code for potential security vulnerabilities. But we don’t stop with our own assessment. We work with the best in the business—whether that’s a top university, a major technology vendor, or even a group of elite hackers to put our products to the test.
Intel Trust Authority has achieved ISO 27001:2022 certification. The Confidential Computing attestation service is committed to delivering best practices in security controls, information technology and cybersecurity to our clients and their customers. For more information: https://www.intel.com/content/www/us/en/quality/corporate-certifications/directory.html.
Contact Us
Connect with an Intel representative today to discuss solutions for your business, to set up a demo, or to get started.