mirror of
https://github.com/confidential-containers/confidential-containers.git
synced 2025-04-28 03:21:03 +00:00
Standardize documentation filenames.
snake_case to match typical Rust style. Only applies to documentation not files LICENSE or CODEOWNERS or README.md Signed-off-by: Tobin Feldman-Fitzthum <tobin@ibm.com>
This commit is contained in:
parent
e9c2f0f6a3
commit
35b303498d
@ -19,9 +19,9 @@ delivering Confidential Computing for guest applications or data inside the TEE
|
|||||||
|
|
||||||
[](https://asciinema.org/a/eGHhZdQY3uYnDalFAfuB7VYqF)
|
[](https://asciinema.org/a/eGHhZdQY3uYnDalFAfuB7VYqF)
|
||||||
|
|
||||||
- [Project Overview](./Overview.md)
|
- [Project Overview](./overview.md)
|
||||||
- [Our Roadmap](./Roadmap.md)
|
- [Our Roadmap](./roadmap.md)
|
||||||
- [Alignment with other Projects](ALIGNMENT.md)
|
- [Alignment with other Projects](alignment.md)
|
||||||
|
|
||||||
|
|
||||||
### Associated Repositories
|
### Associated Repositories
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# Threat Vectors/Profiles
|
# Threat Vectors/Profiles
|
||||||
|
|
||||||
Links to further documentation detailing specific threats and how Confidential Containers uses
|
Links to further documentation detailing specific threats and how Confidential Containers uses
|
||||||
the trust concepts described in the context of the [Trust Model](./TrustModel.md) will be added here.
|
the trust concepts described in the context of the [Trust Model](./trust_model.md) will be added here.
|
||||||
|
|
||||||
Current TODO List for Threats to be covered is tracked under Issues [#2](https://github.com/confidential-containers/documentation/issues/29)
|
Current TODO List for Threats to be covered is tracked under Issues [#2](https://github.com/confidential-containers/documentation/issues/29)
|
@ -30,7 +30,7 @@ Confidential Computing. We explore trust using different orthogonal ways of cons
|
|||||||
native approaches when they use an underlying TEE technology and
|
native approaches when they use an underlying TEE technology and
|
||||||
identifying where there may be considerations to preserve the value of using a TEE.
|
identifying where there may be considerations to preserve the value of using a TEE.
|
||||||
|
|
||||||
Further documentation will highlight specific [threat vectors](./ThreatsOverview.md) in detail,
|
Further documentation will highlight specific [threat vectors](./threats_overview.md) in detail,
|
||||||
considering risk,
|
considering risk,
|
||||||
impact, mitigation etc as the project progresses. The Security Assurance section, Page 31, of
|
impact, mitigation etc as the project progresses. The Security Assurance section, Page 31, of
|
||||||
Cloud Native Computing Foundation (CNCF)
|
Cloud Native Computing Foundation (CNCF)
|
Loading…
Reference in New Issue
Block a user