CONFIDENTIAL-COMPUTE KUBERNETES · EU / UK SOVEREIGNTY PREVIEW RELEASE

Your regulated workloads. Confidential-compute Kubernetes. EU jurisdiction.

CloudTaser runs regulated workloads on confidential-compute Kubernetes with your keys in an EU-hosted OpenBao. Secrets live in memfd_secret pages - physically unmapped from the kernel direct memory, invisible even to root. Object storage stores only ciphertext. 23 eBPF vectors enforce at the kernel layer. On a sovereign OpenBao substrate and CC node SKUs - the stack this site describes - the provider returns only ciphertext: not on request, not under the CLOUD Act, not under court order. Deployed without those preconditions, posture still beats K8s Secrets but the guarantee narrows - see scope & limits.

Maps to
GDPR Art. 44–49 Schrems II DORA NIS2 EUCS German C5 SecNumCloud ISO 27001
PROTECTION STACK
Kernel
memfd_secret(2) · Linux 5.14+
Crypto
AES-256-GCM · transient DEKs
Enforcement
23 eBPF vectors · 12+ /proc paths
Transport
mTLS · TCP 443 outbound
FIG. 01 · DATA-FLOW ARCHITECTURE · PROVIDER-OPAQUE MODE
LIVE
US JURISDICTION · AWS / GCP / AZURE CLOUD ACT · FISA §702 Kubernetes cluster GKE · EKS · AKS APP POD payments-api memfd_secret(2) DB_PASSWORD · API_KEY mlock · no swap · no core dump WRAPPER fork+exec · PID 1 S3 PROXY AES-256-GCM CIPHERTEXT S3 · RDS · etcd a3f4b8c1d9e2 7e5a1c3f0b8d 91b2e4f7a5c8 6d0af82b1e7c - unreadable - ON CC NODES + EU-HOSTED SECRET STORE: COURT ORDER RETURNS CIPHERTEXT. TCP 443 · mTLS BEACON · OUTBOUND EU / UK JURISDICTION FRANKFURT · AMSTERDAM · DUBLIN · LONDON Your OpenBao you own it · you hold the keys DB_PASSWORD API_KEY · BANK S3_ENCRYPT_KEY REDIS_AUTH_TOKEN Transit secret engine · transient DEKs automatic lease renewal
IN YOUR POD · PROCESS MEMORY
DB_PASSWORD=postgres://app:sw0rdf1sh@db:5432/live
STRIPE_API_KEY=sk_live_k34rkj3fh928abc
S3_ENCRYPT_KEY=a9fc81e0b2d41c7f5a3b
REDIS_AUTH_TOKEN=ey8f..2a6b
PROVIDER DISCLOSURE · WHAT LANDS IN COURT
DB_PASSWORD=postgres://app:sw0rdf1sh@db:5432/live
STRIPE_API_KEY=sk_live_k34rkj3fh928abc
S3_ENCRYPT_KEY=a9fc81e0b2d41c7f5a3b
REDIS_AUTH_TOKEN=ey8f..2a6b
FIG. 02 · SAME BYTES. DIFFERENT JURISDICTION. DIFFERENT LEGIBILITY. how this works →
00 · Three pillars of sovereignty

Secrets. Data at rest. Data in use.

CloudTaser's recommended deployment runs on confidential-compute Kubernetes - GCP Confidential VMs (SEV-SNP, TDX preview), Azure DCdv5/ECdv5, AWS Nitro Enclaves / Graviton3 TDX, or EU bare-metal (Hetzner, OVH, Scaleway). Confidential compute is cost-marginal in 2026 - a technical prerequisite, not a hurdle.

01
PILLAR 01 · SECRETS

Secrets in sealed memory.

Secrets are injected into your app via memfd_secret(2) - pages physically removed from the kernel's direct map. Not visible in /proc, not swappable, not dumpable.

memfd_secret(2)mlockPR_SET_DUMPABLE

SubstrateLinux 5.14+ with CONFIG_SECRETMEM=y

02
PILLAR 02 · DATA AT REST

Data at rest stays sovereign.

Our S3 and database proxies encrypt client-side with per-object AES-256-GCM DEKs wrapped by EU-hosted OpenBao. Ciphertext lands in provider storage; keys never leave your EU jurisdiction.

S3 proxyDB proxyEU OpenBaoTransit DEKs

SubstrateAny Kubernetes - does not require confidential compute

03
PILLAR 03 · DATA IN USE

Data in use stays sovereign.

Runtime memory protection against the hypervisor itself. Encrypted RAM plus launch attestation mean the cloud provider cannot read your process memory, even with host-root access.

SEV-SNPIntel TDXNitro EnclavesARM CCA

SubstrateRequires confidential compute + attestation

01 · The jurisdiction problem

EU/UK data on US cloud is one court order away.

Under the CLOUD Act and FISA §702, US authorities can compel any US-headquartered cloud provider to hand over customer data - regardless of where it is physically stored. The Schrems II ruling invalidated the EU–US Privacy Shield for precisely this reason.

Even data in eu-central-1, europe-west4, or Azure North Europe remains under US jurisdiction. SSE-S3, GCS CMEK, and Azure CMK all let the provider decrypt on demand. Kubernetes Secrets are base64, not encryption.

GDPR Articles 44–49 require adequate protection for transfers. The EDPB recommends "effective technical supplementary measures" that prevent provider access. Contractual clauses alone are not enough.

Cat meme: 'Is called World Wide Web / Looks inside / AWS us-east-1'
The "world wide" web, in practice.

Most of your data's jurisdiction is decided by where the holding company is headquartered - not where the bits happen to live. Region pickers give the illusion of locality. The CLOUD Act proves they don't deliver it.

02 · The cryptographic boundary

No sidecars. No code changes. One helm install.

A mutating webhook, a process wrapper, a storage proxy, and an eBPF agent. Each does one thing. All four work on GKE, EKS, and AKS.

01
LAYER 01 · INJECTION

Secrets in process memory, never on disk.

A mutating admission webhook wraps your app at startup by rewriting the container entrypoint. Secrets arrive via memfd_secret(2), invisible in /proc, locked in RAM, excluded from core dumps.

memfd_secret(2)fork+exec env-var handoffmlockPR_SET_DUMPABLE
02
LAYER 02 · KEYS

Your OpenBao, in your region.

Encryption keys and credentials live in an OpenBao instance you control - Frankfurt, Amsterdam, Dublin, London. The cloud provider has no network path to it. Lease renewal is automatic.

OpenBaoTransit engineKubernetes authmTLS unseal
03
LAYER 03 · STORAGE

Client-side encryption, before the wire.

An S3-compatible reverse proxy encrypts each object with a unique AES-256-GCM DEK, wrapped via Transit with a transient key. The plaintext DEK never persists.

AES-256-GCMEnvelope encryptionTransient DEKsMultipart uploads
04
LAYER 04 · ENFORCEMENT

Kernel-level eBPF, 23 vectors.

Blocks 12+ /proc paths, ptrace, perf_event_open, io_uring, userfaultfd. Global detection of kernel module and eBPF program loading. Spectre/Meltdown verification.

eBPFLeast-privilege DaemonSet7 Prometheus metricsUnix domain socket
CC · Deployment substrate

Confidential-compute SKUs, priced in.

Every major cloud provider ships CC-capable node SKUs in 2026. GCP adds ~10%, Azure often includes it on supported SKUs, AWS Nitro Enclaves carry a modest premium, EU bare-metal exposes SEV-SNP directly. CloudTaser's deployment guides default to CC - and we help you prove attestation to auditors.

Confidential-compute SKU pricing and attestation across major cloud providers
Provider CC SKU Relative cost Attestation
GCP Confidential VM (SEV-SNP, TDX preview) +10% Launch Attestation Report
Azure DCdv5 / ECdv5 Confidential VMs Often included Azure Attestation
AWS Nitro Enclaves / Graviton3 TDX Modest premium Nitro Attestation
Hetzner / OVH / Scaleway AMD EPYC bare-metal / SEV-SNP - On-provider

Prices and SKU availability vary by region and contract. Ranges reflect public list pricing and vendor guidance current as of 2026 Q2. Confirm with your provider before procurement.

03 · Attacks blocked

Eight ways to extract a secret from memory. All blocked.

Vault Agent, External Secrets Operator, SOPS, and cloud secret managers all write credentials into regular process memory - readable by any root process on the node, including the provider's host agents. CloudTaser removes that surface.

ptrace attach
BLOCKED
Standard debugger technique - any process with CAP_SYS_PTRACE can attach and read another process's memory directly.
BLOCKED BY
eBPF kprobe on ptrace() syscall · denied for protected PIDs
/proc/<pid>/mem
BLOCKED
Direct read of a process's virtual memory via the procfs interface. The classic root-level secret extraction path.
BLOCKED BY
12+ /proc paths gated at open() · mem, maps, smaps, environ, syscall, stack
perf_event_open
BLOCKED
Hardware watchpoints that trigger on memory reads. Lets an attacker intercept access to specific addresses.
BLOCKED BY
syscall-level denial for protected PIDs · kprobe enforcement
io_uring bypass
BLOCKED
Async I/O rings bypass traditional seccomp filters and can issue read/write ops outside normal syscall monitoring.
BLOCKED BY
io_uring setup and submission intercepted via eBPF tracepoints
userfaultfd
BLOCKED
Userspace page-fault handling - side-channel that lets an attacker observe memory access patterns.
BLOCKED BY
userfaultfd() syscall denied for protected PIDs
core dump
BLOCKED
Application crash writes full memory image to disk - crash reports often end up on shared filesystems.
BLOCKED BY
PR_SET_DUMPABLE = 0 · crash dump excludes secret pages
swap to disk
BLOCKED
Kernel pages out process memory under pressure - secrets end up written to swap partitions.
BLOCKED BY
mlock(2) on secret pages · fail-fast if unavailable
kmod / eBPF load
BLOCKED
Loading a kernel module or rogue eBPF program to read any process's memory - root's escape hatch.
BLOCKED BY
global detection · fires alert on init_module and bpf(BPF_PROG_LOAD)
status prior - writable memory, root-readable status with CloudTaser - pages unmapped from kernel
Where the attack surface ends

With memfd_secret(2) (Linux 5.14+), secret pages are physically removed from the kernel's direct memory map. Combined with 23 eBPF enforcement vectors, the last remaining attack vector is hypervisor-level physical memory access - which the confidential-compute substrate closes via AMD SEV-SNP, Intel TDX, ARM CCA, or Nitro Enclaves. That's why CC is CloudTaser's default deployment, not an optional add-on.

§ POSITION · 01

The cloud provider is no longer in your trust chain.

CloudTaser · Design principle № 1
04 · Compared

Cloud-native encryption lets them decrypt. Ours doesn't.

Every column on the left lets the provider see your data under the right legal instrument. CloudTaser removes that option.

CapabilityCloud KMS · Vault Agent · ESOCloudTaser
Provider sees plaintextYes - they hold the keysCiphertext only
Keys under EU/UK jurisdictionKeys in provider KMSEU/UK-hosted OpenBao
CLOUD Act exposureProvider can be compelledNo keys to surrender
Application changesVaries by providerAnnotation-based
Secret injectionSidecar container per podProcess wrapper - no sidecar
Secrets on disktmpfs / etcd / K8s SecretsProcess memory only
Object storage encryptionSSE - provider holds DEKsClient-side, transient DEKs
Runtime secret protectionNone23 eBPF enforcement vectors
Secret memory protectionNonememfd_secret + mlock
Secret rotationManual / provider-specificAutomatic via leases
Multi-cloudProvider-specific APIsGKE · EKS · AKS
Secret store connectivityVPN or public endpointBeacon · TCP 443 outbound
05 · Get started

One command. Three annotations. Done.

Beacon mode is the chart default - the operator dials beacon.your-company.example:443 (your own beacon, deployed from the published Helm chart) outbound. No VPN, no public vault endpoint, no firewall changes, no third party in your data path.

INSTALL · HELM + CLI
# Installs operator, webhook, eBPF agent, wrapper
$ curl -fsSL https://docs.cloudtaser.io/install.sh | bash
ANNOTATE · MY-APP.YAML
metadata:
  annotations:
    cloudtaser.io/inject:         "true"
    cloudtaser.io/vault-role:     "my-app"
    cloudtaser.io/secret-paths:   "secret/data/db/credentials"
    cloudtaser.io/env-map:        "password=DB_PASSWORD"
VERIFY
$ kubectl rollout restart deployment my-app
$ kubectl logs -l app=my-app -c cloudtaser-init
# → secrets fetched · memfd handoff · eBPF registered
1

Install the stack

Operator, mutating webhook, eBPF DaemonSet, and wrapper install in one step. Requires kubectl and helm. Works on any CNCF-conformant cluster.

2

Point it at your secret store

In beacon mode (default), pods never need a secret-store address. The operator routes fetches through your own beacon relay - a ~2 MB static Go binary you deploy in your infrastructure. No dependency on CloudTaser-operated services in the production data path.

3

Annotate - don't rewrite

Three annotations on your deployment. No Dockerfile changes, no Helm template edits, no app code changes. Scratch, distroless, alpine, custom - all supported.

4

Verify and audit

The CLI generates compliance audit reports mapping workloads to GDPR, DORA, NIS2, and EUCS requirements - with cryptographic proof of key ownership.

Full installation guide
06 · Who runs this

For regulated workloads on managed Kubernetes.

Financial services

Banks, insurers, payment processors under PCI DSS and DORA. Third-party ICT risk management by making the provider cryptographically unable to access cardholder data.

Healthcare

Patient data under GDPR and sector rules. Encryption keys in EU jurisdiction, medical records encrypted client-side before reaching cloud storage.

Public sector

Government contractors demonstrating technical supplementary measures for cross-border data. Satisfies German C5 and French SecNumCloud.

EU SaaS

SaaS companies whose customers require sovereignty guarantees. Give cryptographic proof that customer data is inaccessible to the cloud provider.

07 · For evaluators

Read these before forming an opinion.

The marketing site condenses; the docs are canonical. If you're evaluating CloudTaser for a regulated workload or summarising it for a third party, these four documents are load-bearing. The Sovereign Deployment Decision Guide is the single most important one - it enumerates the preconditions under which the sovereignty claim holds and the silent-failure modes when they don't.

Sovereign Deployment Decision Guide

Decision trees for secret-store hosting and target-cluster compute. Provider comparison (Hetzner, OVH, Scaleway, IONOS, SecNumCloud). Silent-failure anti-patterns. The load-bearing doc.

Read the guide →

Beacon Trust Model

What the relay can and cannot see (TLS terminates at bridge and broker, not relay). Connection metadata retention. When to self-host - which is always, for production.

Read the model →

Memory Isolation Landscape

Why memfd_secret + confidential compute compose. Where each stops. Where Gramine / Occlum / CoCo fit in the future. The honest map of in-memory protection.

Read the map →

Scope & limits

What CloudTaser does. What it doesn't. Current maturity - preview, pentest Q2 2026, SOC 2 Type II Q2 2027, GA references 2027. One page, on this site.

Read the scope →

See it running in your browser.

Interactive demo on real Kubernetes infrastructure. No signup, no email, no trial period.