mirror of
https://github.com/confidential-containers/confidential-containers.git
synced 2025-04-27 19:15:54 +00:00
Confidential Containers Community
The patch includes number of fixes for the architecture doc. Fixes the logical flow between the attestation agent and relying party for all the diagrams. Fixes the architecture diagram for process-based TEEs and replaces references to inclavare with enclave-cc. Added the architecture diagram for peer-pods approach. Finally updated the markdown to use relative paths for the images to make it easier for viewing during reviews and editors. Signed-off-by: Pradipta Banerjee <pradipta.banerjee@gmail.com> |
||
---|---|---|
demos | ||
images | ||
releases | ||
.gitignore | ||
alignment.md | ||
architecture_diagrams.pptx | ||
architecture.md | ||
CODEOWNERS | ||
LICENSE | ||
overview.md | ||
quickstart.md | ||
README.md | ||
roadmap.md | ||
threats_overview.md | ||
trust_model_personas.md | ||
trust_model.md |
Confidential Containers Documentation
Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.
We have a new release every 6 weeks! See Release Notes or Quickstart Guide
Our key considerations are:
- Allow cloud native application owners to enforce application security requirements
- Transparent deployment of unmodified containers
- Support for multiple TEE and hardware platforms
- A trust model which separates Cloud Service Providers (CSPs) from guest applications
- Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE
Further Detail
Associated Repositories
- Kubernetes Operator for Confidential Computing : An operator to deploy confidential containers runtime (and required configs) on a Kubernetes cluster