HPE tinker

Fortanix Teams with HPE and NVIDIA to Embed Confidential Computing in AI Factories

Read Press Release

Content
What is secure key release in cryptographic systems?How does secure key release work?Why is secure key release important for data security?What problems does secure key release solve?How does secure key release differ from traditional key management?What are attestation-based secure key release mechanisms?How do hardware root of trust and secure enclaves enable secure key release?What is composite attestation, and how does it impact key release?How do secure key release systems verify runtime environments?Which trusted execution environments (TEEs) support secure key release?How do CPUs and GPUs integrate in secure key release workflows?What cryptographic protocols are used in secure key release?How does secure key release affect cloud and hybrid deployments?Does secure key release improve compliance with standards like GDPR, HIPAA, and PCI DSS?Can secure key release prevent unauthorized key access, even if the infrastructure is compromised?What are the risks if secure key release is not implemented?How is secure key release implemented in cloud environments?Can secure key release integrate with Kubernetes workloads?What role does secure key release play in CI/CD pipelines?How does secure key release affect DevOps workflows?Why does secure key release matter for AI and RAG pipelines?How can secure key release protect AI models and data in use?What is secure key release for confidential AI workloads?How do secure key release and confidential computing work together?Can secure key release be used in multi-cloud and hybrid cloud architectures?How is secure key release evolving with post-quantum cryptography (PQC)?What’s the difference between secure key release and hardware security modules (HSMs)?Is secure key release necessary for zero-trust architectures?What tools or platforms support secure key release today?What are the best practices for implementing secure key release?How do secure key release policies get defined and enforced?What’s the performance impact of secure key release?How do you audit secure key release workflows?How do you test secure key release in development vs production?How does secure key release prevent keys from being leaked in cloud workloads?What’s the difference between secure key release and normal key distribution?What is composite attestation, and why does it matter for secure key release?Can secure key release protect AI model weights during inference?How do you implement secure key release in Kubernetes with Confidential Computing?

Secure Key Release

What is secure key release in cryptographic systems?

At the most basic level, secure key release means encryption keys are only given out when certain security checks are passed. Instead of handing out keys just because someone is logged in or on the right network, the system first checks whether the application is running in a trusted and approved way. If those checks fail, the key isn’t shared. This makes it harder for attackers or misconfigured systems to access sensitive data.

How does secure key release work?

Secure key release works by gating access to encryption keys behind a verification step, typically based on attestation. Before a key is released, the workload must prove it’s running in an approved environment with the expected software, configuration and hardware protections. That proof is cryptographically validated rather than manually approved or network-checked. Only after successful verification does the system allow the workload to access the key.

Why is secure key release important for data security?

Under traditional security models, once a system is authenticated, it’s trusted with sensitive keys. But that’s not good enough in modern cloud and AI environments. Secure key release significantly reduces risk by ensuring keys are available only at the moment they’re needed and only to verified workloads. This limits the damage caused by breaches that do occur and helps prevent keys from being misused if the infrastructure is compromised.

What problems does secure key release solve?

Secure key release addresses a common yet vital gap in modern security: protecting data while it’s actively in use. It prevents keys from being exposed to administrators, attackers or misconfigured systems simply because they have network or platform access. It also helps eliminate hardcoded secrets and older credentials that are tough to manage safely. All of this improves security without slowing down applications.

How does secure key release differ from traditional key management?

Traditional key management focuses on how keys are stored, rotated and distributed, which is still very important. But secure key release adds another layer by controlling when and under what conditions a key can be accessed. Instead of releasing keys based on static permissions, it evaluates the runtime state of the workload requesting the key. This makes access to keys dynamic, context-aware and much harder to abuse. 

What are attestation-based secure key release mechanisms?

Attestation-based secure key release relies on cryptographic proof of a system’s integrity. A workload generates an attestation report that describes its hardware, software and configuration state, which is then verified against predefined policies before any keys are released. This ensures that keys are only accessible to workloads running exactly as expected. 

How do hardware root of trust and secure enclaves enable secure key release?

A hardware root of trust is a built-in security feature that helps confirm a system hasn’t been altered or tampered with. Secure enclaves are protected areas physically located on chips inside a computer that keep sensitive code and data separated from the rest of the system. Together, they allow the system to prove that it’s running safely and as expected. Secure key release relies on this proof before allowing access to encryption keys. 

What is composite attestation, and how does it impact key release?

Composite attestation extends the attestation model by verifying multiple components of a system together, such as CPUs, GPUs, drivers and runtime software. Instead of trusting a single element, the system evaluates the integrity of the entire stack. This has become more important in the age of AI workloads, where multiple layers must be trusted simultaneously. It ties key release to the integrity of the entire environment, not just one of its components. 

How do secure key release systems verify runtime environments?

As previously mentioned, this is achieved through cryptographic attestation. The workload provides signed evidence about the hardware, firmware, operating system and application state it’s running in. That evidence is checked against existing security policies before a key is released. This is the best way to verify the actual integrity of the environment. If the environment doesn’t match expectations or requirements, access to keys is denied. 

Which trusted execution environments (TEEs) support secure key release?

Secure key release is supported by several major trusted execution environments available in modern hardware, including Intel SGX, Intel TDX, AMD SEV-SNP and Arm TrustZone. Each TEE has hardware-enforced isolation and attestation capabilities. While the implementations differ, they all enable workloads to prove they’re running in protected environments, making them suitable for secure key release.

How do CPUs and GPUs integrate in secure key release workflows?

Both CPUs and GPUs play a role in processing sensitive data, especially in this AI era. Secure key release workflows can include attestation from both CPU and GPU components to ensure that workloads running on GPUs meet the same trust requirements as CPU-based processes. By verifying both, organizations prevent gaps where sensitive data is exposed during offloaded computation.

What cryptographic protocols are used in secure key release?

Secure key release relies on standard cryptographic building blocks such as public key infrastructure, digital signatures and secure key exchange protocols. These authenticate attestation reports and protect communication between workloads and management systems. Hardware-backed attestation typically includes signed measurements that can be independently verified, and together, these protocols ensure that keys are released only after proof of trust is established.

How does secure key release affect cloud and hybrid deployments?

In cloud and hybrid environments, infrastructure is obviously shared and often managed by third parties. Secure key release allows organizations to keep control over when and how encryption keys are accessed, even in those shared settings. This means you don’t have to rely on trusting cloud operators or administrators. It also makes it easier to apply consistent security policies across your environments. 

Does secure key release improve compliance with standards like GDPR, HIPAA, and PCI DSS?

Many of these types of standards require strict limitations on who has access to protected information and under what conditions, and secure key release helps organizations meet these requirements with stronger controls over access to sensitive data. By tying key access to verified environments, secure key release serves as an additional layer of enforcement that supports compliance efforts and helps demonstrate compliance during audits.

Can secure key release prevent unauthorized key access, even if the infrastructure is compromised?

This is one of the main benefits of secure key release: it reduces the impact is infrastructure is compromised. Even if attackers somehow gain administrative access, they may still be unable to obtain encryption keys; without a valid attestation from a trusted environment, keys simply aren’t released. This helps contain breaches and protects sensitive data from being decrypted.

What are the risks if secure key release is not implemented?

Without secure key release, encryption keys may be accessible with basic static permissions or infrastructure trust alone. This greatly increases the risk that keys can be extracted, misused or leaked during a breach. It also makes it much harder to detect when workloads are running in unsafe or misconfigured environments. Over time, this creates bigger headaches in the event of a breach and a higher potential to expose sensitive data. 

How is secure key release implemented in cloud environments?

In cloud environments, secure key release is typically integrated with cloud-native or external key management systems. Workloads request keys only after providing valid attestation evidence. The key management system then evaluates the evidence before allowing access. This gives organizations full control over keys even when using third-party cloud infrastructure. 

Can secure key release integrate with Kubernetes workloads?

Yes, it integrates with Kubernetes by tying key access to workload identity and runtime attestation. Containers and pods can be configured to request keys only after they prove they’re running in approved environments. This prevents sensitive data from being inserted into untrusted or misconfigured workloads across Kubernetes’ dynamic, containerized environments.

What role does secure key release play in CI/CD pipelines?

Secure key release makes CI/CD pipelines safer by ensuring secrets and signing keys aren’t automatically exposed to every build job. Instead, keys are only released when the pipeline step runs in a verified environment that matches policy, reducing the chance of a compromised runner, rogue plugin or misconfigured job pulling sensitive keys. It also encourages teams to treat security checks as part of the pipeline rather than an afterthought.

How does secure key release affect DevOps workflows?

At first, it may seem like secure key release would slow teams down, but it often has the opposite effect. Instead of manually managing lots of passwords, secrets and access rules, teams can rely on automatic policies. If a workload is approved and running in a trusted environment, it gets access to what it needs. If it isn’t, access is blocked. Over time, this makes security easier to manage and more consistent across development, testing and production.

Why does secure key release matter for AI and RAG pipelines?

AI and RAG pipelines often concentrate high-value assets in a single location, whether it’s private datasets, embeddings, prompts, retrieved context or proprietary model weights. These pipelines also handle sensitive information at runtime, exactly when traditional security measures are weakest.  

Secure key release helps by ensuring data-access keys and model-access keys are only available to trusted (and verified) pipeline components. That’s particularly useful when multiple services, such as retrievers, vector stores and model servers, must work together without over-sharing private data. 

How can secure key release protect AI models and data in use?

In many AI systems, sensitive data and model weights must be decrypted in memory to be used, creating a window of exposure. Since secure key release withholds keys unless the runtime environment is proven trustworthy, that risk is significantly reduced. 

What is secure key release for confidential AI workloads?

Secure key release keeps AI model weights and other sensitive data protected. If a model or agent proves it’s running inside a trusted environment, it’s good to go and receives the keys it needs to decrypt data.  

It’s important to clarify that confidential computing alone doesn’t automatically control who gets keys; it provides the trusted boundary. Secure key release enforces the rule: no attestation, no key. 

How do secure key release and confidential computing work together?

Confidential computing isolates data and enforces and attestation so workloads can prove they’re running in a safe environment. Secure key release uses that attestation as the condition for granting access to encryption keys, meaning data and models are protected from both attackers and internal team members with unauthorized access. This philosophy is especially relevant in AI factories where runtime trust determines what’s safe to run.

Can secure key release be used in multi-cloud and hybrid cloud architectures?

Yes, and it’s actually one of the more practical reasons executives and architects adopt it. Secure key release lets organizations apply the same policy logic across on-prem, cloud and hybrid environments, even if the underlying infrastructure differs. There’s no need to assume each cloud is equally trustworthy because keys are released based on verified runtime conditions. That makes cloud deployments more consistent across providers and reduces the risk of a weak link. 

How is secure key release evolving with post-quantum cryptography (PQC)?

Post-quantum cryptography is changing how we think about long-term confidentiality and cryptographic agility. Secure key release fits into that transition by enforcing stronger controls over when keys are exposed and to whom, which matters regardless of the algorithm in use. As PQC standards are adopted, many organizations will want key management systems that can rotate, upgrade and enforce policy without redesigning applications. Secure key release helps by keeping key access under governance while crypto implementations evolve beneath it.

What’s the difference between secure key release and hardware security modules (HSMs)?

An HSM is primarily about protecting keys and cryptographic operations inside a piece of hardware. Secure key release is about controlling when the keys are made available to workloads and under what verified conditions.  

In practice, the two are complementary: HSMs store and protect keys, while secure key release decides whether a given workload is allowed to use them. This is why secure key release is sometimes called “policy-gated key access,” rather than key storage alone. 

Is secure key release necessary for zero-trust architectures?

It’s not mandatory, but it certainly aligns naturally with zero trust. Zero trust means you don’t automatically trust networks, identities or infrastructure, so key access shouldn’t be granted just because something is “inside” your environment.  

Secure key release extends zero trust into runtime by requiring workloads to prove they’re in a trusted state before receiving keys. It’s a particularly strong model for cloud, container and AI workloads. 

What tools or platforms support secure key release today?

Secure key release can be delivered through platforms that combine key management with attestation-aware policy enforcement, including confidential computing platforms, enterprise key management systems, and HSM-backed key services that can gate access based on workload integrity. Cloud providers also offer things such as managed KMS and confidential computing options, although the depth of attestation gating can vary widely. Fortanix supports secure key release through policy-controlled key management and HSM-grade protections, and it’s also as part of confidential AI workflows in Armet AI.

What are the best practices for implementing secure key release?

You’ll want to start by defining what “trusted” means for each of your workloads. Also, keep your policies narrow and release keys only to the smallest set of workloads that truly need them. To do this, map keys to specific purposes (data decryption vs model access vs signing, for example).  

In addition, design for and plan to rotate and revoke keys from day one; secure key release is most effective when keys can be changed quickly without slowing down or completely breaking systems. 

How do secure key release policies get defined and enforced?

Policies are usually defined as rules that tie key access to measurable properties of a workload and its environment. Think the identity of a workload, expected code measurements, the presence of a TEE, and other constraints such as region, cluster or time-based controls. Policies are enforced at the point of key request: the system validates the evidence and checks it against your policies before anything is released. If the policy doesn’t match, the request fails. There are no exceptions and no “temporary access” shortcuts.

What’s the performance impact of secure key release?

Keys are typically released at workload startup or at defined checkpoints, then used locally for the duration of a session, which keeps performance mostly unchanged while still enforcing strong controls. The bigger “cost” is often in the initial setup: designing effective policies and integrating attestation properly, but that’s also where most of the security value comes from. 

How do you audit secure key release workflows?

Auditing secure key release involves recording every key request along with the associated attestation evidence, along with the policy decision that allowed or denied it. A strong audit trail can quickly answer basic questions: which workload requested the key, what environment it was running in, what policy was evaluated, and what was released.  

These records are especially useful during incident response because they give you a clear chain of access decisions. In more mature implementations, audit logs integrate with SIEM tools so security teams can detect anomalies in near real time. 

How do you test secure key release in development vs production?

The safest approach is to treat development and production as separate trust domains with separate policies and separate keys. In development, teams often use more relaxed policies or sandbox attestation, but the integration flow should remain the same so you’re not testing a “different system.”  

In production, requirements should be tightened: verified images, enforced TEEs, stricter identity controls and stronger auditing. The key is to avoid the common trap of building something that only works in development, then trying to retrofit real attestation at the last minute. 

How does secure key release prevent keys from being leaked in cloud workloads?

Secure key release reduces leakage by avoiding broad key distribution in the first place. Keys aren’t baked into data or handed to workloads simply because they have cloud permissions. The workload must prove it’s running in an approved, trusted environment before any key material is released. This is what makes it harder for attackers to grab keys through compromised instances, misconfigured roles or stolen credentials.  

What’s the difference between secure key release and normal key distribution?

Normal key distribution is typically about delivering keys to systems that are authenticated and authorized, often based on identity, network location or role. Secure key release takes this a step further by verifying runtime integrity before granting access to keys.  

Think of it as not just asking who are you, but what you’re running, and where. That’s a huge difference in cloud and container environments where identity controls alone don’t guarantee the workload hasn’t been altered. Essentially, secure key release adds a cryptographic check on trust. 

What is composite attestation, and why does it matter for secure key release?

Composite attestation is when you validate multiple parts of the runtime stack together, rather than trusting a single component. This matters now more than ever because real-world workloads, especially AI workloads, often span CPUs, GPUs, drivers, container layers and orchestration systems. If only one of these layers is deemed safe, keys could be released even if another layer is compromised. The idea behind composite attestation is to establish a broader chain of trust. With AI, “trusted CPU + untrusted GPU” is not a safe combination. 

Can secure key release protect AI model weights during inference?

Yes. Secure key release helps protect AI model weights by making sure only approved systems can unlock and use them. The model files stay encrypted, and the keys needed to use them are only given to trusted environments.  

This makes it much harder for someone to copy or steal the model, even if they have access to the servers. It also helps limit who inside an organization is allowed to run models that use valuable or sensitive AI. 

How do you implement secure key release in Kubernetes with Confidential Computing?

In Kubernetes, secure key release is usually set up so that sensitive workloads only run on special secure nodes. Before a container or pod is given access to secrets or keys, the system checks that it’s running in a trusted and approved environment.  

Kubernetes handles starting and managing the workloads, while secure key release controls whether they’re allowed to get keys. This means secrets are only provided to verified workloads and are not automatically available across the cluster. 

Fortanix-logo

4.6

star-ratingsgartner-logo

As of January 2026

SOCISOPCI DSS CompliantFIPSGartner Logo

US

Europe

India

Singapore

4500 Great America Parkway, Ste. 270
Santa Clara, CA 95054

+1 408-214 - 4760|info@fortanix.com

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712