Amazon EC2 Instance Attestation
docs.aws.amazon.comNote that physical access and an interposer can be used to decrypt memory. See this other recent story[0].
> They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key.