Confidential Containers Community
Go to file
Dan Middleton 720bf64b69 Formatting fixups and date fix
Signed-off-by: Dan Middleton <dan.middleton@intel.com>
2023-03-30 07:51:24 -05:00
demos Remove outdated SEV documentation 2023-01-17 18:30:30 +01:00
images doc: Trust Model Personas 2022-10-11 14:38:05 +02:00
releases Formatting fixups and date fix 2023-03-30 07:51:24 -05:00
.gitignore docs: Trust Model Introduction 2022-03-09 22:07:01 +01:00
alignment.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
architecture_diagrams.pptx documentation: Confidential Containers architecture 2022-09-28 09:24:11 +02:00
architecture.md small typo 2023-02-04 14:17:11 -06:00
CODEOWNERS docs : Add CODEOWNERS file 2022-03-03 14:40:51 +01:00
LICENSE Initial commit 2021-10-04 18:40:23 +03:00
overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
quickstart.md sev: update skopeo encrypt command to use 'docker' target 2023-02-10 16:32:27 -05:00
README.md Update release announcement 2022-11-09 18:50:09 +01:00
roadmap.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
threats_overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
trust_model_personas.md trust_model_personas: Remove white spaces 2022-10-14 12:13:00 -05:00
trust_model.md doc: Trust Model Personas 2022-10-11 14:38:05 +02:00

logo

Confidential Containers Documentation

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

We have a new release every 6 weeks! See Release Notes or Quickstart Guide

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE

Further Detail

asciicast FOSSA Status

Associated Repositories

License

FOSSA Status