Private AI Inference — HIPAA & GDPR Compliant Confidential Compute on Intel TDX
What is Confidential Compute?
Confidential computing protects data during processing using hardware-based Trusted Execution Environments (TEEs). VoltageGPU provides NVIDIA H200 140GB GPUs secured with Intel TDX (Trusted Domain Extensions). Your workload runs as an attested container inside a hardware-isolated Trust Domain — a CPU-sealed virtual machine designed so that the host operator, hypervisor, and VoltageGPU do not have technical means to read enclave memory in plaintext. This is the same TDX technology used by Microsoft Azure Confidential Computing and Google Cloud Confidential VMs, with the container model keeping deploys to under 60 seconds rather than minutes. No security control eliminates all residual risk (e.g., side-channel attacks on shared hardware) — TDX raises the cost of unauthorized access rather than guaranteeing absolute protection.
Security Architecture
- Intel TDX (Trusted Domain Extensions) — Hardware-isolated VMs verified by CPU microcode. The architecture is designed so that the hypervisor and host OS do not have technical means to read enclave memory in plaintext.
- AES-256-XTS Memory Encryption — RAM encrypted at hardware level using AES-256-XTS with keys fused into the CPU. Physical memory dumps yield ciphertext rather than plaintext.
- Protected PCIe — CPU-to-GPU communication encrypted in transit, mitigating bus-sniffing attacks under the TDX threat model.
- LUKS Disk Encryption — Full block-level disk encryption for data at rest.
- No prompt/output retention by design — Enclave memory and disk state are destroyed when the pod terminates. Security and billing logs are retained per the schedule at /legal/security.
- Publicly verifiable attestation — Intel TD Quote and NVIDIA GPU attestation reports are signed by CPU/GPU-fused private keys and verified off-chain against Intel and NVIDIA public PKIs (DCAP). No blockchain is required; no customer data is published.
Hardware Specifications
- NVIDIA H200 — 141 GB HBM3e, Confidential Computing mode, Protected PCIe
- NVIDIA B200 — 192 GB HBM3e, next-generation Blackwell architecture
- Intel TDX on 4th/5th Gen Xeon Scalable processors
- Per-second billing, no minimum commitment
Compliance and Regulatory Frameworks
Confidential computing with Intel TDX is architected to support requirements across multiple regulatory frameworks. Final compliance assessment depends on customer configuration and use. See /trust for live status and disclaimers.
- GDPR Article 28 (in place) — VoltageGPU acts as processor; signed DPA + SCCs available on request. The TDX architecture is designed so that the processor does not have technical means to read customer data in plaintext, complementing contractual safeguards.
- HIPAA (architected to support) — Designed to support 45 CFR §164.312 technical safeguards for PHI processing. BAA available on request. VoltageGPU is not itself "HIPAA-certified" — no such certification exists for vendors in isolation; the covered entity remains responsible for end-to-end HIPAA compliance.
- SOC 2 Type I (audit firm selection in progress, target Q4 2026) — NOT YET HELD. Hardware attestation is intended to support evidence of security controls.
- ISO 27001 / ISO 42001 (target Q1 2027 / 2027 in scope) — NOT YET HELD. Roadmap published at /trust.
- DORA Article 30 — Contractual provisions available for ICT third-party service contracts (NIS2 and DORA obligate operators/financial entities, not vendors).
- NIS2 Article 21 — Aligned with risk-management measures expected from ICT supply-chain providers.
- EU AI Act (Aug 2026) — Designed to support provider/deployer obligations; attestation evidence is intended to support Art. 15 cybersecurity documentation for high-risk systems.
- French CNIL — Aligned with CNIL guidance on confidential AI processing. CNIL does not certify vendors.
Industry Adoption of Confidential Computing
Confidential computing is adopted by leading cloud providers and enterprises:
- Microsoft Azure Confidential Computing — Intel TDX and AMD SEV-SNP based VMs
- Google Cloud Confidential VMs — Intel TDX support on N2D and C3 instances
- NVIDIA Confidential Computing — Hopper, Blackwell, and Vera Rubin GPU architectures
- Confidential Computing Consortium (Linux Foundation) — Members include Intel, AMD, NVIDIA, Microsoft, Google, ARM, Huawei
- Fortanix — Healthcare clinical data processing (Xeureka partnership)
- Anjuna Security — Public sector secured LLM deployment
Use Cases
- Law firms — Analyze contracts, NDAs, and privileged documents inside hardware enclaves, architected to support professional-secrecy obligations. Final compliance is the firm's responsibility under applicable bar rules.
- Financial services — Process quarterly reports, audit data, and transaction records. Architected to support DORA Art. 30 and MiFID II ICT requirements (contractual provisions available).
- Healthcare — Analyze patient records and clinical data inside sealed enclaves, designed to support HIPAA technical safeguards. BAA required for PHI processing.
- Government and defense — Process sensitive documents with hardware-verified isolation and publicly verifiable attestation.
- Compliance teams — Run AI on regulated data with attestation evidence intended to support GDPR Art. 28, DORA Art. 30, NIS2 Art. 21, and CNIL guidance.
About VoltageGPU
VoltageGPU is a Confidential AI Infrastructure platform operated byVOLTAGE EI (SIREN 943 808 824 00016), based in Solaize, France. VoltageGPU provides confidential AI inference (12 TEE models via OpenAI-compatible API), confidential compute, and confidential agents on Intel TDX with per-second billing.