Sorry, you need to enable JavaScript to visit this website.

Feedback

Your feedback is important to keep improving our website and offer you a more reliable experience.

Open Cloud Integrity Technology (Open CIT)

Open CIT is the next generation attestation solution, replacing Open Attestation. Open CIT provides visibility into the cloud datacenter by leveraging Intel processors with Intel® Trusted Execution Technology (Intel® TXT)

Description

What is OPEN CIT

Open CIT is the next generation attestation solution.  Open CIT provides features and capabilities in its entirety, as was made available in the Premium version, including support for ESX and Citrix*-Xen*, KVM on Ubuntu* and Red Hat* Enterprise Linux* (RHEL*) in addition to Hyper-V on Windows* Server. Open CIT provides ‘Trust’ visibility of the cloud infrastructure and enables compliance in cloud datacenters.  The solution leverages Intel processors with Intel® Trusted Execution Technology (Intel® TXT) to establish HW root of trust and builds the chain of trust across hardware, OS, hypervisor, vm and Docker* container and including asset tagging for ocation and boundary control. The platform trust and asset tag attestation information is used by Orchestrators and/or Policy Compliance management to ensure workloads are launched on trusted and location/boundary compliant platforms. They provide the needed visibility and auditability of your infrastructure in both public and private cloud environments.

 

Solution Diagram

 

Deployment Diagram

LATEST NEWS

  • Open CIT 3.2.1 has been released, see the Product Guide and Deployment Guide for more information or download the code from here.
  • Open CIT 3.2.1 added support to compile with Java* 8 instead of Java 7. See the announcement here.

Release Notes

3.2.1

  • Made necessary changes to support compiling with Java 8 instead of Java 7.
  • Resolved an issue with the build process that required a workaround, and updated build instructions accordingly.
  • Updated the OpenStack integration patch for improved security.

 

If you want to see release notes from previous releases, click here.

Quick links

 

 

 

Activating Intel® TXT and TPM

Downloading Open CIT

Extending Open Stack

Platform Trust Enabler (PTE)

Source Code

Mitaka

Starting Skylake use OTA

   
     

 

About Intel's Involvement

Intel is the leading contributor and solo maintainer. Open CIT leverages Intel processors with Intel® Trusted Execution Technology (Intel® TXT) to provide the next generation attestation solution that can be used in private and public clouds.

News & Blogs

OPEN CIT 3.2.1 RELEASE

By 01 Staff (not verified) on Jul 03, 2017

Open CIT 3.2.1 has been released, see the Product Guide and Deployment Guide for more information or pickup the code from here. Open CIT 3.2.1 added support to compile with Java 8 instead of Java 7, see the...

OPEN CIT 3.2 RELEASE

By 01 Staff (not verified) on May 18, 2017

  Open CIT 3.2 has been released, see the Product Guide and Deployment Guide for more information or pickup the code from here. Open CIT 3.2 adds support VM/Container Integrity functionality, Extended...

Previous Release Notes

By 01 Staff (not verified) on May 18, 2017

2.2 Features TPM 2.0 support. Added support for platform and asset tag attestation of Linux and Windows hosts with TPM 2.0. Support attestation of either SHA1 or SHA256 PCR banks on TPM 2.0. Ubuntu 16.04 and RHEL 7.2, 7.3 (SHA1...

OPEN CIT 2.2 RELEASE

By Adolfo Vega Aguayo on Nov 09, 2016

Open CIT 2.2 has been released which adds support for TPM 2.0 for Linux and Windows.  To learn more about our previous release, click here.   Click here to learn what Open CIT is.   Open CIT 2.2 Features...