Bring your own cloud

BYOC deploy

Deploy a signed .kolm to your own infrastructure. kolm.ai mints the deploy manifest and records the attestation; you keep the keys and the network path. For payload-blind operation, pick a Trusted Execution Environment target.

Read the docs

Your deployments

Loading

Trust model

01 · manifest

kolm.ai signs the deploy manifest (deploy_id + artifact_id + enroll_token + issued_at) with an HMAC anyone with the receipt secret can verify.

02 · deploy

You run the script. It pulls the artifact, builds a Docker image (or EIF for Nitro), and starts the runtime on your hardware.

03 · attest

On TEE targets the image POSTs the vendor-signed measurement (Nitro PCRs, GCP attestation token, Azure CVM SNP report). On non-TEE targets, an image SHA.

04 · payload-blind

TEE targets keep request payloads encrypted in memory; kolm.ai cannot see them. Non-TEE targets are private from us at the network level only.