OpenStack private cloud infrastructure in secure, isolated environments for confidential workloads with hardware-level security features

The confidential computing market is experiencing unprecedented growth, with organizations across healthcare, finance, government, and blockchain industries handling increasingly sensitive data. Confidential computing protects data in use by encrypting data in memory and processing it only after the cloud environment is verified to be a trusted execution environment – addressing the final frontier of data security by protecting information not just when stored or transmitted, but while actively being processed. For organizations requiring maximum security, compliance, and operational control, a hybrid approach combining OpenStack-powered private cloud with dedicated bare metal confidential computing resources offers the most compelling solution that public cloud simply cannot match.

Why Private Cloud for Confidential Workloads?

Public cloud environments, while convenient and scalable, present inherent limitations for confidential workloads. When using shared infrastructure, organizations face potential risks from privileged users, malicious actors within the system, and limited control over data location and access.

Data sovereignty has become a critical compliance requirement, with regulations like GDPR emphasizing that data protection laws apply based on the location of the data subject, not the data processor. Organizations must navigate complex jurisdictional requirements where different countries impose varying restrictions on data transfer and storage.

Private cloud infrastructure addresses these challenges by providing:

  • Complete infrastructure control – Physical servers dedicated exclusively to your organization
  • Data sovereignty assurance – Keep sensitive data within specified geographic boundaries
  • Compliance certainty – Meet strict regulatory requirements for healthcare, finance, and government
  • Custom security policies – Implement organization-specific security controls and access policies

OpenStack: The Foundation for Secure Private Cloud

OpenStack is an open-source cloud computing infrastructure platform that provides common services for cloud infrastructure, controlling large pools of compute, storage, and networking resources through APIs or a dashboard. Unlike proprietary solutions, OpenStack provides complete transparency and control over your cloud environment.

For confidential workloads, OpenStack offers several key advantages as the foundational infrastructure layer:

Identity and Access Management with Keystone

OpenStack’s Keystone service manages authentication and authorization across the cloud environment, allowing businesses to implement strict access controls and enforce policies for users, services, and APIs. Keystone supports multi-factor authentication (MFA) and role-based access control (RBAC) for granular permissions.

Network Security and Isolation with Neutron

Neutron, OpenStack’s networking component, creates secure and isolated networks through network segmentation using VLANs or VXLANs, Firewalls-as-a-Service (FWaaS) for perimeter defense, and support for software-defined networking (SDN) integration.

Data Protection and Encryption

OpenStack ensures data security at rest and in transit through services like Cinder (block storage) and Swift (object storage) that support encryption to protect sensitive information. This includes data encryption at rest using volume encryption features and end-to-end encryption for secure data transfers.

Multi-tenancy for Organizational Isolation

For businesses hosting multiple teams or clients, OpenStack’s multi-tenancy feature ensures that each tenant operates in an isolated environment, preventing data leakage or unauthorized access.

The Current State of Confidential Computing Integration

While confidential computing technologies like Intel TDX and SGX represent the cutting edge of data protection, their integration with OpenStack is still evolving. Direct integration of TDX and SGX into the main OpenStack codebase is an ongoing effort, with limited upstream support currently available in official OpenStack distributions.

Some experimental and third-party projects have demonstrated how to enable SGX and TDX in OpenStack environments, but this work is not yet fully integrated into the mainstream OpenStack ecosystem. This creates both challenges and opportunities for organizations seeking to implement confidential computing.

OpenMetal’s Hybrid Approach: Best of Both Worlds

OpenMetal addresses the current limitations of confidential computing integration by offering a hybrid architecture that combines the proven security and management capabilities of OpenStack private cloud with dedicated bare metal servers that support hardware-level confidential computing.

OpenStack Private Cloud Foundation

OpenMetal provides private cloud infrastructure built on OpenStack and Ceph with full hardware and network control. Each deployment includes infrastructure-level private networking with dedicated VLANs, dual 10 Gbps private links per server, and unmetered traffic between servers.

Within OpenStack Projects, you can create Virtual Private Clouds (VPCs) that include custom IP ranges, VXLAN overlays, firewall rules, and VPN-as-a-Service. These features allow workloads to operate in logically isolated environments with defined security boundaries.

Cloud deployment uses OpenMetal automation to create a production-ready OpenStack cluster in about 45 seconds. Additional servers can be added to the cluster in around 20 minutes. OpenStack services available in these clusters include Nova for compute management, Neutron for networking, Cinder for block storage, and Keystone for identity and access management.

Dedicated Bare Metal for Confidential Computing

For workloads requiring hardware-level confidential computing, OpenMetal offers select bare metal servers that support Intel Trust Domain Extensions (TDX) and Intel Software Guard Extensions (SGX). These technologies provide hardware-enforced trust domains, remote attestation, and measured boot processes designed to run sensitive applications such as healthcare data processing, financial systems, blockchain validators, and AI or machine learning jobs that require isolation and verifiable integrity.

Hardware options range from Medium V4 servers, with 24 CPU cores and 256 GB RAM total, to XXL V4 servers with 128 CPU threads total and up to 2 TB RAM. All servers include dual 10 Gbps NICs and NVMe storage.

Hybrid Architecture Benefits

This hybrid approach provides several key advantages:

Seamless Integration: The OpenStack private cloud handles orchestration, networking, and resource management, while dedicated bare metal servers provide hardware-level security for the most sensitive workloads.

Network Connectivity: Both the OpenStack private cloud and bare metal servers can be connected through the same secure network infrastructure, enabling seamless communication between different tiers of your application stack.

Unified Management: You can manage both your OpenStack resources and bare metal servers through a single interface and billing relationship, simplifying operations and cost management.

Flexible Scaling: Start with an OpenStack private cloud for general workloads and add bare metal confidential computing resources as needed for specific use cases.

Implementing a Hybrid Confidential Computing Architecture

Getting started with this hybrid approach involves several key steps:

1. Design Your Architecture

Determine which workloads require hardware-level confidential computing versus those that can run securely on the OpenStack private cloud. Typically, the most sensitive data processing operations run on bare metal with TDX/SGX, while supporting services, databases, and management tools run on the OpenStack infrastructure.

2. Deploy OpenStack Private Cloud Core

Start with an OpenMetal private cloud deployment that provides the foundation for your secure infrastructure. Configure networking, identity management, and storage services to support your application requirements.

3. Add Bare Metal Confidential Computing

Select from Medium V4, Large V4, XL V4, or XXL V4 configurations with TDX and SGX support. These servers integrate with your private cloud network while providing hardware-enforced security boundaries.

4. Configure Network Connectivity

Set up secure networking between your OpenStack private cloud and bare metal servers. Use VLANs and firewall rules to ensure proper isolation while enabling necessary communication between application tiers.

5. Implement Data Flow Security

Design your data processing pipeline so that sensitive operations occur on the bare metal servers with confidential computing, while orchestration, logging, and less sensitive processing happens on the OpenStack infrastructure.

6. Monitor and Audit

Deploy monitoring tools across both environments to track access patterns, system performance, and compliance status. Configure logging and auditing to meet regulatory requirements for your industry.

Real-World Use Cases

Healthcare Data Processing

A healthcare organization can deploy an OpenStack private cloud to handle patient management systems, electronic health records, and administrative applications while using bare metal servers with TDX for processing protected health information (PHI) during clinical research or AI model training. This ensures HIPAA compliance for the most sensitive operations while maintaining operational efficiency.

Financial Services Risk Analysis

Financial institutions can run their customer-facing applications and databases on OpenStack private cloud while performing sensitive fraud detection algorithms or trading model calculations on bare metal servers with SGX. This approach ensures data sovereignty requirements are met while maintaining the performance needed for real-time financial operations.

AI and Machine Learning Pipeline

Organizations developing proprietary AI models can use OpenStack private cloud for data preprocessing, model serving, and application hosting, while conducting sensitive model training on bare metal servers with confidential computing capabilities. This protects intellectual property during the most critical phases of model development.

Blockchain Infrastructure

Web3 and crypto organizations can deploy their application infrastructure on OpenStack while running blockchain validators and wallet services on bare metal servers with hardware-level security. This approach provides both operational flexibility and maximum security for cryptographic operations.

Cost-Effective Infrastructure Management

Predictable Pricing Model

OpenMetal’s pricing is based on fixed monthly costs per server configuration rather than usage-based metering. For egress, traffic above included allowances is billed at $375 per Gbps using 95th percentile measurement. This allows traffic bursts without immediate overage charges while keeping costs predictable across both OpenStack and bare metal resources.

Unified Billing and Management

Managing both OpenStack private cloud and bare metal resources under a single relationship simplifies procurement, budgeting, and ongoing operations. You can scale each component independently based on your specific requirements without managing multiple vendors or contracts.

Enterprise-Grade Network and Security Features

Public networking includes dual 10 Gbps uplinks per server, DDoS protection up to 10 Gbps per IP, and support for customer-owned IP space. This gives you control over routing and addressing for workloads that must meet compliance or sovereignty requirements.

When implementing confidential workloads, following established security practices is crucial for maintaining a secure environment. This includes implementing strong authentication mechanisms, comprehensive monitoring, network segmentation, and regular security updates across both OpenStack and bare metal components.

The Future of Confidential Computing Integration

The confidential computing landscape continues to evolve rapidly. According to industry research, the global confidential computing market is projected to reach over $1.2 trillion by 2034, with a compound annual growth rate exceeding 60%1. This explosive growth reflects the increasing importance of protecting data in use across all industries.

As OpenStack’s confidential computing integration matures, organizations that start with this hybrid approach will be well-positioned to take advantage of native integration as it becomes available. The foundation of secure private cloud infrastructure combined with hardware-level confidential computing provides a forward-looking architecture that can evolve with the technology.

Regulatory frameworks are also evolving to address data-in-use protection. The NIST Cybersecurity Framework now includes specific guidance for protecting data during processing, while European regulations like DORA mandate data-in-use protection for financial institutions.

Getting Started with OpenMetal

OpenMetal provides the infrastructure, expertise, and support needed to implement this hybrid confidential computing architecture successfully. With both OpenStack private cloud capabilities and bare metal servers featuring hardware-level security, you can build an environment that meets your most demanding security and compliance requirements while maintaining operational flexibility.

Whether you’re processing healthcare data, running financial algorithms, training AI models, or validating blockchain transactions, OpenMetal’s hybrid approach gives you the control and security that confidential workloads demand without forcing you to choose between cloud flexibility and hardware-level security.

Ready to explore how this hybrid architecture can transform your organization’s approach to sensitive data processing? Contact our team to discuss your specific requirements and learn how OpenMetal can support your confidential computing initiatives.

 

Read More on the OpenMetal Blog

Exit Readiness: How Private Cloud Infrastructure Improves Valuation Multiples

SaaS companies preparing for exit can achieve premium valuations through private cloud infrastructure that delivers predictable costs, margin stability, and operational discipline that buyers reward with higher multiples.

EBITDA Impact of Cloud Repatriation: Why PE Firms Are Moving Portfolio SaaS Back to Private Cloud

Private equity firms are systematically implementing cloud repatriation strategies across SaaS portfolios to convert unpredictable cloud costs into fixed expenses, typically reducing infrastructure spending by 30-50% while improving EBITDA forecasting accuracy. This strategic shift addresses the margin compression caused by usage-based cloud billing and creates sustainable competitive advantages for portfolio companies.

From Serverless to Private Cloud: Bringing MicroVM Speed and Isolation In-House

Explore the evolution from public serverless to private cloud serverless platforms. Learn how microVM technologies like Firecracker and Cloud Hypervisor enable enterprises to build in-house serverless solutions with predictable costs, better performance, and no vendor lock-in on OpenMetal infrastructure.

Intel TDX Performance Benchmarks on Bare Metal: Optimizing Confidential Blockchain and AI Workloads

Discover how Intel TDX performs on bare metal infrastructure with detailed benchmarks for blockchain validators and AI workloads. Learn optimization strategies for confidential computing on OpenMetal’s v4 servers with 20 Gbps networking and GPU passthrough capabilities.

Confidential Computing Infrastructure: Future-Proofing AI, Blockchain, and SaaS Products

Learn how confidential computing infrastructure secures AI training, blockchain validators, and SaaS customer data using hardware-based Trusted Execution Environments. Discover OpenMetal’s approach to practical deployment without operational complexity.

Infrastructure Consistency for SaaS Companies: Scaling Without Losing Control

Infrastructure inconsistency silently undermines SaaS scalability, creating performance unpredictability, security gaps, and operational complexity. This comprehensive guide shows technical leaders how to achieve consistency without sacrificing agility through dedicated private cloud infrastructure, standardized deployment patterns, and systematic implementation strategies that prevent configuration drift while supporting rapid growth.

Cutting Cloud Costs in Your SaaS Portfolio: Private vs Public Cloud TCO

SaaS companies backed by private equity face mounting pressure to control cloud costs that often reach 50-75% of revenue. This comprehensive analysis compares private vs public cloud TCO, showing how infrastructure optimization can improve gross margins and company valuations.

Case Study: A Startup’s $450,000 Google Cloud Bill – Lessons for Startups

Part 2 of this three part series on “How Startups and Scaleups Can Avoid the Hidden Fees of Public Cloud” delves into a real live story of a startup hit with a $450K GCP cloud bill and the lessons to be learned.