Status values
These values are defined by Intel’s DCAP specification:| Status | Meaning | Production use |
|---|---|---|
UpToDate | Platform is fully patched with the latest TCB level released by Intel | ✅ Always use - this is the recommended production setting |
SWHardeningNeeded | The platform is up-to-date, but the software (TD/Enclave) requires specific hardening mitigations | ⚠️ Use only if you have verified that your software stack implements the necessary code-level mitigations to operate safely on this hardware |
ConfigurationNeeded | The platform is patched, but the BIOS/hardware configuration does not meet the recommended security baseline | ⚠️ Use only if your specific threat model tolerates the configuration risk |
OutOfDate | Platform TCB level is lower than the latest version released by Intel | ⚠️ Use only if combined with a grace period to allow operations to continue temporarily during patch cycles |
Revoked | The processor or signing keys have been compromised and explicitly invalidated by Intel | ❌ Never use - platform is considered compromised |
Configuring allowed TCB statuses
Specify which TCB statuses to accept in your policy:Grace periods for OutOfDate platforms
Grace periods allowOutOfDate platforms to operate for a limited time after a new TCB level is released. This accommodates patch deployment cycles while maintaining security.
How grace periods work
- Intel releases a new TCB level with security patches
- Previously
UpToDateplatforms becomeOutOfDate - If a grace period is configured, platforms are accepted if:
tcb_date + grace_period >= current_time - After the grace period expires, attestation fails
Example with 30-day grace period
Grace period best practices
- Keep it short - 30 days or less is recommended
- Monitor actively - Track when platforms become
OutOfDateand update them promptly - Zero grace for critical services - High-security applications should use
grace_period: 0or omit it entirely - Coordinate with patching - Align grace periods with your infrastructure patch deployment schedule
No grace period (immediate enforcement)
Setgrace_period to 0 to require immediate patching:
grace_period: 0, only UpToDate platforms are accepted in practice, even though OutOfDate is in the allowed list.
Production recommendations
High security environments
For production systems handling sensitive data:- Only accepts fully patched platforms
- Rejects any platform with known vulnerabilities
- Provides the strongest security guarantees
Balanced production environments
For systems that need operational flexibility during patch cycles:- Accepts
UpToDateplatforms immediately - Gives a 14-day window for patching
OutOfDateplatforms - Balances security with operational requirements
Development and testing
For non-production environments:- Accepts multiple TCB statuses
- Disables runtime verification
- Should never be used in production
Error handling
When a platform’s TCB status is not allowed, verification fails with a specific error:References
Related
DstackTdx policy
Configure Intel TDX attestation
Computing measurements
Generate bootchain measurements