Skip to main content

Introduction

Discover the core principles and benefits that drive the development of OBLV Deploy

What's OBLV Deploy?

OBLV Deploy provides a solution to ensure data security throughout the processing stages by using secure enclaves. Data Protection regulations are a key concern of every country and company. While in-rest and in-transit data protection solutions are widespread, the security of processing doesn't have a well-established and approachable solution. OBLV Deploy fills the gap using enclaves to provide:

Confidential Computing

OBLV Deploy is a confidential computing solution. If you are new to the field, see the Confidential Computing page, where the topic is covered from the basics.

OBLV Deploy Unique Features

OBLV Deploy and standard enclaves like AWS Nitro Enclave offer robust security features regarding isolated runtime and attestation documents to verify the integrity of the environment. However, OBLV Deploy provides additional features to enhance security, usability, and performance.

Security and Flexibility

OBLV Deploy extends the basic feature set of standard enclaves with attested TLS, ensuring that all traffic entering and leaving the enclave is encrypted and verified against a trusted certificate. Moreover, OBLV Deploy supports controlled outbound connections, which allows precise control over network traffic, ensuring that only authorised connections are made. Container digest controls provide another layer of security by ensuring that only containers with verified digests are executed.

Simplified Operations

OBLV Deploy seamlessly integrates into existing workflows. It requires no modification to CI/CD processes or development environments, making it incredibly straightforward to adopt without disrupting current operations.

Customisation and Performance

OBLV Deploy extends the basic feature set of standard enclaves with attested TLS, ensuring that all traffic entering and leaving the enclave is encrypted and verified against a trusted certificate. Moreover, OBLV Deploy supports controlled outbound connections, which allows precise control over network traffic, ensuring that only authorised connections are made. Container digest controls provide another layer of security by ensuring that only containers with verified digests are executed.

What's Next?

Now that you know the solution OBLV Deploy provides, you can start learning how to use it. In this documentation, you find two ways to use the getting started page. If you're an administrator, the OBLV Deploy team recommends you start with the Quick Start Guide. However, if you're an end-user, see the Making an Attested Connection page.