We implemented Nitro attestation first while I was at Turnkey for QuorumOS as that is an AWS stack however IMO TPM2 is the way to go today for the most universal support now that the big 3 cloud providers all offer endorsement key APIs. You could then support CPU-unique attestations where possible on top provided you have an out of band source of truth for expected CPU certificates.
One of our projects at Distrust is to handle all of the above in a universal library/spec we are working on called Bootproof, which will ship with EnclaveOS for broad hardware/software attestation support out of the box via a tiny rust daemon and client.
One of our projects at Distrust is to handle all of the above in a universal library/spec we are working on called Bootproof, which will ship with EnclaveOS for broad hardware/software attestation support out of the box via a tiny rust daemon and client.