Understanding Attestation Process in a Confidential Computing Solution

  • Receives evidence from the attester (confidential VM or container) via challenge-response protocol
  • Relay the evidence to the Attestation Service (Verifier) for verification.
  • Apply appraisal policy for the returned Attestation Results to assess the trustworthiness of the attester.
  • Interact with Key Management Service to retrieve the keys and send them to the attester

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store