Skip to main content

Introduction

Polaris Pro enables the secure deployment of stateful applications within a Trusted Execution Environment (TEE), encrypting all data in transit, and isolating sensitive information from the underlying infrastructure. With Polaris Pro, users can securely store encrypted data across cloud, disk, or database storage, accessible only within the TEE.

Overview

Fr0ntierX’s Polaris Pro Secure Container utilizes Confidential Virtual Machines (CVM) to isolate Docker workloads within a fully encrypted environment – CVMs offer full memory encryption with minimal overhead, shielding data from both the cloud provider and internal IT resources. With Polaris, sensitive information remains encrypted at all stages: at rest, in transit, and when in use.

Polaris Pro encrypts HTTP requests to protect against exposure risks. Our encryption process uses a public key provisioned on the client’s infrastructure and managed within the TEE by the Polaris secure proxy. With encryption handled transparently within the TEE, no workload changes are necessary.

All responses are automatically encrypted with the public key provided by the user’s request, and Polaris SDK securely and easily decrypts the information. Polaris SDK can perform the encryption and decryption inside either a server or browser environment.

Polaris Pro securely encrypts data across disks, cloud storage, databases, and more using a permanent key stored within the TEE. Access is restricted through an attestation policy, verifying workload integrity and can block SSH access or limit usage to pre-approved software versions. The Polaris SDK handles both encryption and decryption for seamless data protection.

Key Benefits

  • Data Encryption: Security at all stages – at rest, in transit, and in use
  • Complete Isolation: Workloads shielded from cloud providers and internal IT resources
  • Transparent Encryption: All requests and responses are automatically encrypted and decrypted
  • No Modifications Required: No workload changes necessary
  • Encrypted Data Storage: Securely store encrypted information
  • TEE-Based Decryption: Secure data decryption within a Trusted Execution Environment
  • Optional Software Version Pinning: Only allow pre-approved software versions to decrypt data