Confidential Containers Community
Go to file
Pradipta Banerjee bae433e921
Update architecture doc and diagrams (#111)
The patch includes number of fixes for the architecture doc.
Fixes the logical flow between the attestation agent and relying party
for all the diagrams.
Fixes the architecture diagram for process-based TEEs and replaces
references to inclavare with enclave-cc.
Added the architecture diagram for peer-pods approach.
Finally updated the markdown to use relative paths for the images to make
it easier for viewing during reviews and editors.

Signed-off-by: Pradipta Banerjee <pradipta.banerjee@gmail.com>
2023-04-01 15:41:59 +05:30
demos Remove outdated SEV documentation 2023-01-17 18:30:30 +01:00
images Update architecture doc and diagrams (#111) 2023-04-01 15:41:59 +05:30
releases Formatting fixups and date fix 2023-03-30 07:51:24 -05:00
.gitignore docs: Trust Model Introduction 2022-03-09 22:07:01 +01:00
alignment.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
architecture_diagrams.pptx Update architecture doc and diagrams (#111) 2023-04-01 15:41:59 +05:30
architecture.md Update architecture doc and diagrams (#111) 2023-04-01 15:41:59 +05:30
CODEOWNERS docs : Add CODEOWNERS file 2022-03-03 14:40:51 +01:00
LICENSE Initial commit 2021-10-04 18:40:23 +03:00
overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
quickstart.md sev: update skopeo encrypt command to use 'docker' target 2023-02-10 16:32:27 -05:00
README.md Update release announcement 2022-11-09 18:50:09 +01:00
roadmap.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
threats_overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
trust_model_personas.md trust_model_personas: Remove white spaces 2022-10-14 12:13:00 -05:00
trust_model.md doc: Trust Model Personas 2022-10-11 14:38:05 +02:00

logo

Confidential Containers Documentation

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

We have a new release every 6 weeks! See Release Notes or Quickstart Guide

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE

Further Detail

asciicast FOSSA Status

Associated Repositories

License

FOSSA Status