James Magowan 9fc29c7c19 docs: Trust Model Introduction
Add a introduction to Trust Model (Part of Issue #28).
Include references and links to prior art

Follow on Pull Requests will include sections corresponding to orthogonal ways of considering cloud native approaches relevent to the trust model
Specifically including
   - Personas
   - Lifecycle
   - Trusted Execution Boundary Location
   - Secured v unsecured TEE Base Image

Signed-off-by: James Magowan <magowan@uk.ibm.com>
2022-03-09 22:07:01 +01:00
2021-12-23 19:46:31 +05:30
2021-11-25 15:06:17 +01:00
2022-03-09 22:07:01 +01:00
2021-10-18 11:46:31 -04:00
2022-03-03 14:40:51 +01:00
2021-10-04 18:40:23 +03:00
2021-11-10 14:30:03 +00:00
2021-12-07 16:31:08 +01:00
2021-11-25 15:06:17 +01:00
2022-03-09 22:07:01 +01:00

logo

Welcome to documentation repository for Confidential Containers

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes Cluster administration capabilities which impact delivering Confidential Computing for guest application or data inside the TEE.

Further Detail

asciicast

Associated Repositories

Description
Confidential Containers Community
Readme Apache-2.0 4.9 MiB
Languages
Markdown 100%