Confidential Containers Community
Go to file
Steve Horsman 06c81daa12
Merge pull request #198 from lysliu/doc-fix
Doc update: correct worker node label
2024-09-20 09:12:32 +01:00
.github gh: drop project creation and cncf onboarding issue templates 2024-09-03 09:10:09 -04:00
demos
guides docs: Add guide for IBM Secure Execution 2024-09-16 12:33:44 +02:00
images
releases docs: add release notes for v0.9.0 2024-07-26 10:01:25 -04:00
.gitignore
ADOPTERS.md Update ADOPTERS.md:Add NanhuLab to the adopter. 2024-08-15 09:06:58 -05:00
alignment.md
architecture_diagrams.pptx
architecture.md
coco_logo.png
CODE_OF_CONDUCT.md
CODEOWNERS
CONTRIBUTING.md
fig1-ci-cd-failure.png
fig2-ci-cd-log.png
governance.md governance: Update Intel's representation 2024-05-29 14:15:37 +02:00
LICENSE
MAINTAINERS
overview.md
PR-Review-Guide.md
quickstart.md Merge pull request #198 from lysliu/doc-fix 2024-09-20 09:12:32 +01:00
README.md
roadmap.md
threats_overview.md
trust_model_personas.md docs: fix broken links 2024-08-26 07:30:08 -05:00
trust_model.md docs: fix broken links 2024-08-26 07:30:08 -05:00

logo

Confidential Containers

CII Best Practices

Welcome to confidential-containers

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

We have a new release every 6 weeks! See Release Notes or Quickstart Guide

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE

Get started quickly...

Further Detail

asciicast FOSSA Status

Contribute...

License

FOSSA Status