Confidential Compute
SDK source (GitHub): https://github.com/tangle-network/blueprint/tree/main/crates/manager
This page covers the operator requirements for running services that prefer or require TEE execution.
Two TEE Paths
Operators can satisfy confidentiality requirements in two different ways today:
- Local container TEE path: run container sources on Kubernetes with the
kataruntime class. - Remote TEE path: provision a confidential-compute VM through a supported cloud provider and run the blueprint there.
The blueprint manager treats TEE as a deployment policy. It does not require a separate “TEE source” entry in the blueprint manifest.
Local Container TEE Path
For container sources on the Tangle manager path:
tee_requiredfails closed if no container source exists.tee_requiredfails closed if Kubernetes does not expose thekataruntime class.tee_preferreduses Kata when available, but can still fall back to standard execution.
At minimum, operators need:
- Kubernetes
- Docker or a compatible container runtime
- Kata Containers installed and exposed as the
kataruntime class
Remote TEE Path
Remote confidential-compute deployments currently require a TEE-capable provider:
- AWS
- GCP
- Azure
When TEE is required, the manager must not silently fall back to non-TEE providers.
Preflight Workflow
The fastest way to validate remote TEE readiness is:
cargo tangle cloud configure aws --region us-east-1 --set-default
cargo tangle cloud preflight --tee-required --bootstrap-envThat checks provider configuration, cloud credentials, TEE capability, and attestation policy requirements before you run the manager.
Required Environment
For remote TEE deployments, operators should expect to configure:
export BLUEPRINT_REMOTE_TEE_REQUIRED=true
export BLUEPRINT_REMOTE_TEE_ATTESTATION_POLICY=cryptographic
export BLUEPRINT_REMOTE_TEE_ATTESTATION_VERIFY_CMD=/usr/local/bin/verify-tee-attestation
export TEE_BACKEND=aws-nitroBLUEPRINT_REMOTE_TEE_ATTESTATION_POLICY supports:
cryptographic: requiresBLUEPRINT_REMOTE_TEE_ATTESTATION_VERIFY_CMDto be present and executable.structural: checks structural provider readiness without an external verifier command.
If GCP is the selected provider, the preflight path also expects:
export BLUEPRINT_ALLOWED_SSH_CIDRS=10.0.0.0/8
export BLUEPRINT_ALLOWED_QOS_CIDRS=10.0.0.0/8What Operators Should Expect
tee_requiredprevents non-TEE fallback.- The manager injects
TEE_REQUIRED=trueandTEE_BACKENDinto remote deployments when TEE is required. - Cryptographic attestation policy fails the deployment if attestation verification fails.
tee_preferredis softer: the operator can still serve the workload without hard failure if the blueprint policy allows fallback.