Threat Model

Mitigated

  • Host OS compromise: SGX protects enclave confidentiality/integrity.

  • Insider risk: operators cannot extract keys.

  • DB exfiltration: data encrypted; keys remain enclave‑only.

Residual

  • Microarchitectural side‑channels (mitigations depend on microcode/patching).

  • Compromised client devices.

  • Social engineering / phishing.

Best Practices

  • Keep firmware/SGX stacks current.

  • Rate‑limit OTP/OAuth; monitor for abuse.

  • Enforce IP allowlists on API keys (when available) and strict CORS.

Last updated