Skip to content

TEE for Agent Identity

Agent identity keys stored on standard hosts are vulnerable to:

  • Host OS compromise
  • Admin access abuse
  • Memory inspection attacks

Trusted Execution Environments (SGX, Nitro Enclaves) provide:

  • Hardware-isolated memory — OS/hypervisor cannot read
  • Remote attestation — Prove what code is running
  • Sealed storage — Keys encrypted to specific workloads
┌────────────────────┐ ┌─────────────────────┐
│ Agent Runtime │ RPC │ TEE: Identity │
│ (untrusted) │─────────▶│ Sentinel Service │
│ │ │ │
│ • Planner │ │ • Master Key │
│ • Tools │ │ • Sign/verify │
│ • UI │ │ • Policy eval │
└────────────────────┘ └─────────────────────┘
  1. Phase A: AWS Nitro Enclaves + KMS attestation
  2. Phase B: Multi-TEE abstraction layer
  3. Phase C: Attested capability tokens for tools

TEEs protect key custody and provide attestation, but don’t prevent logical vulnerabilities. They’re risk-reducing, not magic.


Research extracted from SAP development notes