This page covers the OpenMetal XXL v4 configured as a confidential computing platform. The XXL v4 is the only server in the OpenMetal v4 lineup where Intel TDX (Trust Domain Extensions) is active at the base configuration — 2TB of DDR5 RAM ships at deployment exceeding the 1TB threshold required for TDX activation, with no additional RAM upgrade needed. The underlying server hardware is identical to the standard XXL v4; this page frames the XXL v4 for workloads where hardware-enforced memory isolation is the primary deployment requirement.

TDX creates hardware boundaries called Trust Domains that prevent even a privileged hypervisor or co-located software from reading or modifying workload memory. Combined with Intel SGX for enclave-level isolation and TME-MK for full memory encryption, the XXL v4 provides a layered hardware security model suited for regulated data processing, multi-tenant SaaS isolation, and sovereign cloud deployments — all at fixed monthly pricing with no shared hardware tenancy.

Key Takeaways

  • TDX active at base config — no upgrade required: Every XXL v4 ships with Intel TDX enabled. For workloads where confidential computing is a requirement, not an option, the XXL v4 removes the upgrade step that other tiers require.
  • Hardware-enforced isolation for regulated workloads: TDX Trust Domains isolate PHI, PII, and financial transaction data in hardware — even the hypervisor cannot read Trust Domain memory. Relevant for HIPAA-covered workloads, PCI DSS-scoped applications, and multi-tenant SaaS where per-tenant data isolation must be provable at the infrastructure level.
  • SGX enclaves alongside TDX VMs — 128 GB EPC: SGX provides a separate isolation model for cryptographic key material, attestation services, and workloads that need hardware-level code isolation smaller than a full VM. 128 GB EPC is available on the same server.
  • 2TB RAM base supports large secure workloads: Confidential database instances, large key management clusters, and federated learning nodes all benefit from the 2TB memory pool without requiring a RAM upgrade to activate TDX.
  • Full memory encryption via TME-MK: All data in DRAM is encrypted at rest via AES-XTS with per-workload key support. Physical memory attacks — cold boot, DMA, DRAM snooping — are mitigated without software-layer changes.
  • Dedicated hardware, fixed pricing, HIPAA-eligible: No shared tenancy. OpenMetal offers BAAs for covered entities. Price locks available up to five years with ramp pricing for migrations. See openmetal.io/bare-metal-pricing.

Server Configuration at a Glance

Processor2x Intel Xeon Gold 6530 (Emerald Rapids, Intel 7)
Total Cores / Threads64 cores / 128 threads
Base / Max Turbo2.1 GHz / 4.0 GHz
L3 Cache160 MB per socket (320 MB total)
Memory2048GB DDR5 4800 MHz — 32 DIMM slots, max 8192GB
Intel TDXActive — no upgrade required (2TB base RAM exceeds 1TB threshold)
Intel SGXAvailable with Intel SPS — 128 GB EPC
Intel TME-MKFull memory encryption, per-workload key support
Boot Storage2x 960GB SSD (RAID 1 mirrored)
Data Storage6x 6.4TB Micron 7500 MAX NVMe = 38.4TB raw
Max Drive Bays24
Private Bandwidth10 Gbps x2 (LACP bonding available)
Public Bandwidth10 Gbps; burst to 40 Gbps; 95th-percentile overage billing
PCIePCIe 5.0, 80 lanes per socket
TenancySingle-tenant dedicated hardware
PricingFixed monthly — see openmetal.io/bare-metal-pricing

Intel TDX on the XXL v4: Hardware-Enforced Trust Domains

Intel TDX is a hardware virtualization extension that partitions server memory into isolated regions called Trust Domains (TDs). Each TD has its own encrypted, integrity-protected memory space that is inaccessible to the hypervisor, host OS, or any other TD — enforced by the CPU memory controller, not by software policy. Attestation reports signed by Intel allow remote parties to verify the TD’s configuration and software state before transmitting sensitive data.

TDX requires a minimum of 1TB of installed RAM to activate, because the processor reserves a portion of physical memory for the Trust Domain Management Module (TDMM) and related metadata structures. On the Large v4 and Medium v4, reaching this threshold requires a RAM upgrade. On the XXL v4, the base 2048GB configuration exceeds the requirement, and TDX is initialized at first boot without any additional configuration by the customer.

What TDX protects against:

  • Hypervisor-level memory inspection (relevant in multi-tenant environments or where the cloud operator’s privileged access must be constrained)
  • Cold boot attacks on VM memory
  • VM-to-VM memory reads in a multi-VM configuration on the same physical host
  • Debugging or inspection of a running VM’s memory state by the host OS

What TDX does not protect against: software vulnerabilities inside the Trust Domain itself, side-channel attacks targeting shared microarchitectural state, or misconfigured TD policies. TDX is an infrastructure-layer control, not a substitute for application-level security.

Intel SGX: Enclave-Level Isolation

SGX (Software Guard Extensions) operates at a finer granularity than TDX. Where TDX isolates an entire VM, SGX isolates individual application-level code regions called enclaves. The XXL v4 supports SGX with Intel SPS and 128 GB of Encrypted Page Cache (EPC).

Common SGX use cases on the XXL v4:

  • Key management services — HSM-equivalent key storage without dedicated hardware; enclave holds private keys, attestation proves the key management code hasn’t been tampered with
  • Cryptographic co-processors — signing, verification, and threshold signature schemes where private key material never leaves the enclave
  • Multi-party computation — federated analytics or ML inference where input data from multiple parties must remain isolated during computation
  • Blockchain confidential transactions — protocols requiring verifiable off-chain computation with on-chain attestation

SGX and TDX can run concurrently on the XXL v4 — TDX VMs handling application workloads while SGX enclaves manage key material or attestation services.

Memory Architecture for Confidential Workloads

The XXL v4’s 2048GB DDR5 4800 MHz configuration supports high-memory confidential workloads that cannot tolerate the memory constraints of smaller TDX-eligible tiers.

EPC sizing for SGX: The 128 GB EPC supports large SGX enclaves without requiring enclave paging, which would cause significant performance degradation for data-intensive enclave workloads. Applications requiring in-enclave data processing — large ML models, multi-party analytics, in-enclave key derivation — benefit from EPC availability without paging overhead.

Memory for multi-tenant TDX clusters: A single XXL v4 hosting multiple TDX VMs for different tenants (SaaS, MSP, or enterprise multi-division isolation) can allocate 50–100+ GB per tenant VM while maintaining meaningful isolation boundaries, using the 2TB pool as a dense allocation budget.

Field-upgradeable to 8TB: DIMM slots allow expansion to 8192GB without server replacement — important for confidential workloads that grow their data footprint over time (in-memory secure databases, growing enclave datasets) without requiring a migration that would break TDX attestation continuity.

Intel TME-MK encrypts all DRAM contents at rest with hardware AES-XTS, applying per-VM or per-workload encryption keys managed by the CPU memory controller. This is distinct from TDX memory encryption — TME-MK provides blanket physical memory protection while TDX provides isolation and integrity enforcement between Trust Domains.

Security and Confidential Computing

TDX (VM-level isolation): Hardware Trust Domains with CPU-enforced memory encryption and integrity protection. Each TD holds an independent VCPU state, memory encryption key, and attestation identity. The hypervisor can manage TD lifecycle (create, pause, terminate) but cannot read TD memory contents. TDX is active at the base 2048GB RAM configuration — no customer action required to enable.

SGX (Enclave-level isolation): Application-level isolated execution with 128 GB EPC. SGX enclaves run inside TDX VMs or on the bare metal host directly. Attestation reports allow remote verification of enclave identity and code state before data is transmitted into the enclave.

TME-MK (Physical memory encryption): All DRAM encrypted via AES-XTS with multi-key support. Protects against physical memory attacks without software changes. Operates below the OS and hypervisor layer.

  • AES-NI — hardware TLS offload for encrypted communications between Trust Domains and external services
  • Intel Boot Guard — hardware-enforced firmware boot chain integrity; prevents rootkits from persisting across reboots
  • Control-Flow Enforcement Technology (CET) — hardware ROP/JOP exploit mitigation; relevant for services running inside SGX enclaves

HIPAA and Regulatory Compliance

OpenMetal is HIPAA compliant at the organizational level and offers BAAs for covered entities. The TDX layer provides infrastructure-level PHI isolation that supports HIPAA technical safeguard requirements around access controls and data integrity — though TDX alone does not make a deployment HIPAA-compliant; application-layer controls, audit logging, and encryption in transit remain the operator’s responsibility.

XXL v4 TDX Edition servers in Ashburn, Virginia are hosted in the NTT DATA VA1 facility, which holds HIPAA, SOC1/2 Type II, ISO 27001, PCI DSS, and NIST 800-53 HIGH certifications at the facility-operator level. Los Angeles (Digital Realty LAX10): SOC2, SOC3, ISO 27001, and PCI DSS — HIPAA compliance for Los Angeles is at the OpenMetal organizational level only. Amsterdam (Digital Realty AMS3): SOC1/2, PCI-DSS, ISO 27001, ISO 50001, and ISO 22301 at the facility-operator level. Singapore (Digital Realty SIN10): BCA Green Mark Platinum.

Recommended Workloads on the XXL v4 TDX Edition

Regulated financial services and transaction processing

Payment processing pipelines, trading systems, and financial analytics running under PCI DSS or SOC 2 scoping benefit from TDX memory isolation that prevents other software on the host from accessing transaction data in memory. High-frequency trading systems and OLTP databases handling payment data can run inside TDX VMs, with SGX enclaves managing the cryptographic key material for signing and encryption — with attestation providing proof to auditors that the key management code was not tampered with at the time of processing.

Healthcare PHI and clinical data workloads

HIPAA-covered workloads processing PHI — EHR systems, clinical analytics, medical imaging pipelines — can use TDX Trust Domains to isolate patient data processing from the host environment. OpenMetal’s BAA covers the infrastructure layer. The XXL v4’s 2TB memory pool supports large clinical databases and in-memory analytics over patient datasets without requiring data to leave the Trust Domain for computation.

Multi-tenant SaaS with hardware data isolation

SaaS operators building products for regulated industries (legal, financial, healthcare) can use TDX VMs to provide customers with provable hardware-level data isolation. Each tenant’s VM operates in its own Trust Domain with a unique encryption key — isolation that software-only solutions cannot provide. Attestation reports can be provided to customers as evidence of isolation configuration, enabling contractual commitments around data handling that go beyond shared-tenancy cloud guarantees.

Key management and cryptographic infrastructure

SGX enclaves on the XXL v4 support open-source HSM-equivalent key management (HashiCorp Vault with SGX backend, Microsoft Azure Attestation-compatible services, or custom enclave applications). The 128 GB EPC allows large in-enclave key derivation trees and multi-party computation workloads without EPC paging. TDX VMs can consume keys from SGX enclaves via local attestation, creating an end-to-end hardware-trusted key management and usage chain.

Sovereign cloud and data residency workloads

Organizations with data residency requirements (EU GDPR, German BSI, healthcare data localization laws) deploying in OpenMetal’s Ashburn (US-East) or Amsterdam (EU-West) regions can use TDX attestation to demonstrate that workload memory is processed only within the physical boundary of the specified data center. The fixed-colocation model — hardware in a known facility, no live migration — supports sovereignty claims that public cloud elasticity models complicate.

Confidential machine learning and federated inference

ML inference pipelines processing sensitive input data (medical records, financial data, biometrics) can run inside TDX VMs, ensuring that inference inputs and model weights are not accessible to the infrastructure operator. Federated learning nodes can use SGX enclaves for secure aggregation, with attestation proving that gradient aggregation code has not been modified before other participants contribute data. The XXL v4’s AMX and AVX-512 hardware accelerators are available inside TDX VMs without hypervisor abstraction overhead.

“Moving our Netherlands region onto OpenMetal completely changed how we operate. We went from a room full of aging leased hardware to a handful of modern NVMe-backed servers that are faster, denser, and far more cost-efficient. The best part was how easy the transition felt — our cloud stack didn’t need to change at all. It just worked.”

Vanessa Vasile, Director of Infrastructure — RamNode

Security architecture diagram of the OpenMetal XXL v4 TDX Edition showing TDX Trust Domain isolation layers, SGX enclaves, and memory encryption

Ready to Deploy a Confidential Computing Environment?

TDX is active at base config — no upgrade quote needed. Tell us about your isolation requirements and we’ll help you configure the right XXL v4 TDX deployment.

Get a XXL v4 TDX Edition Quote   Schedule a Consultation

XXL v4 TDX Edition Deployment Options

Bare Metal Dedicated Server — TDX Active by Default

Deploy the XXL v4 with TDX active at the base 2048GB configuration. Full root access, IPMI remote management, and dedicated hardware — your workloads run on hardware no other customer touches. OpenMetal provisions with your choice of TDX-compatible OS image.

  • TDX-capable OS images: Linux distributions with KVM TDX support available at provisioning; bring your own image via IPMI
  • IPMI access included: Out-of-band management for OS reinstalls, remote KVM, and power control without breaking TDX isolation
  • Fixed monthly pricing: Lock pricing for up to five years
  • Ramp pricing: Available for migrations from environments where TDX enablement required hardware changes or configuration downtime

→ View pricing: openmetal.io/bare-metal-pricing

Available across OpenMetal’s Tier III data center locations. Fixed monthly pricing applies regardless of utilization. No per-hour, per-query, or per-GB billing.

Where to deploy

LocationRegionCertificationsLocation Page
Ashburn, VAUS-EastSOC 1/2 Type II, ISO 27001, PCI DSS, NIST 800-53 HIGH, HIPAA (facility-level)Ashburn
Los Angeles, CAUS-WestSOC 2, SOC 3, ISO 27001, PCI DSSLos Angeles
AmsterdamEU-WestSOC 1/2, PCI-DSS, ISO 27001, ISO 50001, ISO 22301Amsterdam
SingaporeAsiaBCA Green Mark PlatinumSingapore

Get a XXL v4 TDX Edition Quote

Tell us about your infrastructure needs and we’ll provide a custom quote for the XXL v4 TDX Edition.

  • Bare metal TDX: Single-server with Trust Domain Extensions enabled, full IPMI access, HIPAA BAA available
  • Hosted Private Cloud: Three-node cluster with TDX-active hardware and Day 2 ops included
  • Custom configurations: RAM upgrades up to 8192GB (TDX remains active), additional NVMe drives (up to 24 bays)
  • HIPAA BAA: Available for healthcare and regulated workloads at all locations

Ramp pricing available for migrations. All deployments include fixed monthly pricing, 99.96%+ network SLA, and DDoS protection.


Specifications, pricing, and availability are subject to change without notice. The information on this page is provided for general guidance and does not constitute a contractual commitment. Contact OpenMetal for current configuration details and pricing. AWS specifications and pricing are sourced from publicly available documentation and may not reflect current rates or configurations.