Confidential Containers Community
Go to file
Arvind Kumar 802e66cb5c docs: Updating SNP and SEV and quickstart guides
Updating the SEV and SNP guides to include instructions on launching CoCo with SEV and SNP memory encryption.

Signed-off-by: Arvind Kumar <arvinkum@amd.com>
2024-11-15 14:47:07 -05:00
.github gh: drop project creation and cncf onboarding issue templates 2024-09-03 09:10:09 -04:00
demos demos: Add io.containerd.cri.runtime-handler to the ssh demo 2023-10-19 14:50:40 +02:00
guides docs: Updating SNP and SEV and quickstart guides 2024-11-15 14:47:07 -05:00
images
releases Release: v0.10.0 release notes 2024-09-27 13:48:45 -04:00
.gitignore
.lycheeignore Docs: update quickstart 2024-11-07 09:27:49 -05:00
ADOPTERS.md doc: Add IBM Z to OSC list 2024-11-14 09:16:45 +00:00
alignment.md
architecture_diagrams.pptx
architecture.md
coco_logo.png
CODE_OF_CONDUCT.md
CODEOWNERS Update README, CODEOWNERS 2023-06-19 14:53:35 +01:00
CONTRIBUTING.md docs: overhaul contributing guide 2023-09-26 09:09:29 +02:00
governance.md governance: add process for removing maintainers 2024-10-22 11:43:08 -04:00
LICENSE
MAINTAINERS MAINTAINERS: update to match with governance.md 2024-10-30 10:33:19 -04:00
overview.md
PR-Review-Guide.md
quickstart.md docs: Updating SNP and SEV and quickstart guides 2024-11-15 14:47:07 -05:00
README.md README: add a link to our project board 2024-10-22 13:24:50 -04:00
roadmap.md
threats_overview.md
trust_model_personas.md docs: fix broken links 2024-08-26 07:30:08 -05:00
trust_model.md docs: fix broken links 2024-08-26 07:30:08 -05:00

logo

Confidential Containers

CII Best Practices

Welcome to confidential-containers

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

We have a new release every 6 weeks! See Release Notes or Quickstart Guide

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE

Get started quickly...

Further Detail

asciicast FOSSA Status

Contribute...

License

FOSSA Status