Automated remote attestation for Linux machines with TPM 2.0.
or just get started…
One CLI for your whole fleet. Manage from your laptop or enroll a Linux machine directly.
Keylime, Linux IMA, and TPM 2.0 already solve hardware-rooted integrity verification for Linux. But deploying them means managing a registrar, a verifier, mTLS certificates, TPM quote schemas, IMA allowlists, and policy fan-out, none of which is operationally documented anywhere useful.
Ratatouille handles all of it. Generate a policy from a known-good machine, push it to Git, and every enrolled machine is continuously attested against it.
The cryptographic evidence is yours: exportable, independently verifiable, and not locked in our dashboard.
Ratatouille operationalizes proven open-source components. Your policies, your evidence, your cryptographic chain are all verifiable with standard tooling whether or not Ratatouille exists.
Install the Ratatouille agent on a device in a known-good state.
Policy is built from IMA logs of modules and executables loaded since boot.
Sign the policy and push to Git. Ratatouille reads and verifies the policy signature and fans it out to your devices.
At a chosen interval, Ratatouille evaluates a TPM quote over IMA log entries against your policy.
Pull a signed evidence package at any time in a format any auditor can verify independently.
From the chip the manufacturer burned a key into, through to the relying party's access decision. You don't have to trust Ratatouille. You can verify each link yourself.