Confidential Containers Community
Go to file
Wainer dos Santos Moschetta bf7b50c696 quickstart: Update link to sevctl project
sevctl repository at enarx organization is now read-only as the development moved to
https://github.com/virtee/sevctl. The URL was updated in the quickstart.

Signed-off-by: Wainer dos Santos Moschetta <wainersm@redhat.com>
2023-01-16 18:57:09 +01:00
demos ssh-demo: Update runtimeClassName (#59) 2022-11-05 11:35:04 +05:30
images doc: Trust Model Personas 2022-10-11 14:38:05 +02:00
releases Authenticated registry support 2022-12-02 16:21:49 +01:00
.gitignore docs: Trust Model Introduction 2022-03-09 22:07:01 +01:00
alignment.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
architecture_diagrams.pptx documentation: Confidential Containers architecture 2022-09-28 09:24:11 +02:00
architecture.md Update architecture.md 2022-11-09 14:09:46 +01:00
CODEOWNERS docs : Add CODEOWNERS file 2022-03-03 14:40:51 +01:00
LICENSE Initial commit 2021-10-04 18:40:23 +03:00
overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
quickstart.md quickstart: Update link to sevctl project 2023-01-16 18:57:09 +01:00
README.md Update release announcement 2022-11-09 18:50:09 +01:00
roadmap.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
threats_overview.md Standardize documentation filenames. 2022-09-26 18:09:03 +02:00
trust_model_personas.md trust_model_personas: Remove white spaces 2022-10-14 12:13:00 -05:00
trust_model.md doc: Trust Model Personas 2022-10-11 14:38:05 +02:00

logo

Confidential Containers Documentation

Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.

We have a new release every 6 weeks! See Release Notes or Quickstart Guide

Our key considerations are:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE

Further Detail

asciicast FOSSA Status

Associated Repositories

License

FOSSA Status