This checklist covers the essential requirements for deploying Atlas in production environments.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/concrete-security/atlas/llms.txt
Use this file to discover all available pages before exploring further.
Proxy security
- Allowlist contains only authorized TEE endpoints - Review and validate each endpoint in
ATLS_PROXY_ALLOWLIST - Proxy runs with minimal privileges - Use a non-root user account
- Firewall rules restrict proxy’s outbound connections - Only allow connections to authorized TEE endpoints
- Monitoring for connection patterns and failures - Track connection attempts, failures, and unusual patterns
- Rate limiting to prevent abuse - Implement at reverse proxy level
- TLS termination at reverse proxy - Use
wss://instead ofws://for encrypted WebSocket connections - Authentication for proxy access - Implement at reverse proxy level (e.g., API keys, OAuth)
- Regular security updates for dependencies - Keep Rust toolchain and dependencies up to date
Policy configuration
TCB status requirements
- Use
allowed_tcb_status: ["UpToDate"]for production - Only accept fully patched platforms - Configure grace period only if required - Set
grace_periodfor time-limitedOutOfDateacceptance during patch cycles - Never allow
Revokedstatus - Compromised processors must be rejected
TCB status values
| Status | Production use | Notes |
|---|---|---|
UpToDate | ✅ Always use | Platform is fully patched |
SWHardeningNeeded | ⚠️ Use with caution | Verify software implements required mitigations |
ConfigurationNeeded | ⚠️ Use with caution | Verify threat model tolerates configuration risk |
OutOfDate | ⚠️ Use with grace period | Only if combined with grace_period for patch cycles |
Revoked | ❌ Never use | Processor or signing keys are compromised |
Runtime verification
- Provide bootchain measurements - Compute
expected_bootchain(MRTD, RTMR0-2) for your hardware configuration - Provide OS image hash - Verify the Dstack image using
os_image_hash - Provide app compose - Specify expected application configuration via
app_compose - Never set
disable_runtime_verification: true- Runtime verification must be enabled in production
Example production policy
Computing bootchain measurements
Measurements vary based on:- CPU count
- Memory size
- PCI hole size
- Number of GPUs
- Number of NVSwitches
- Hotplug configuration
- QEMU version
dstack-mr tool.
Deployment architecture
Recommended setup
Infrastructure checklist
- Reverse proxy configured - nginx, caddy, or similar for TLS termination
- Process management - systemd, docker, or kubernetes for automatic restarts
- Health monitoring - Monitor proxy health and restart on failure
- Log aggregation - Centralized logging for security auditing
- Metrics collection - Track connection counts, error rates, latency
Operational security
Secret management
- TLS certificates secured - Use proper certificate management
- Policy stored securely - Protect policy configuration files
- Access control implemented - Restrict who can modify proxy configuration
- Audit logging enabled - Log all configuration changes
Incident response
- Security contact defined - Documented point of contact for security issues
- Incident response plan - Defined procedures for security incidents
- Backup proxy instances - Redundancy for high availability
- Rollback procedures - Ability to quickly revert changes
Testing
- Test attestation verification - Verify TEE attestation succeeds with production policy
- Test allowlist enforcement - Verify unauthorized endpoints are rejected
- Test error handling - Verify graceful degradation on failures
- Load testing - Verify performance under expected traffic
- Security testing - Attempt common attacks (SSRF, injection, etc.)
See also
- Security considerations - Attack prevention and encryption details
- Proxy setup - WebSocket proxy configuration