mirror of
https://github.com/confidential-containers/confidential-containers.git
synced 2025-08-16 06:52:57 +00:00
Confidential Containers Community
Fixed: #96 The current quick start is relatively lengthy, this commit make the technology stacks for special HW separate markdown pages: - Use simple-kbs to encrypt container image and deploy it on SEV: `guides/sev-guide.md` - Use Verdictd to encrypt container image and deploy it on TDX: `guides/eaa-verdictd-guide.md` Signed-off-by: Jiale Zhang <zhangjiale@linux.alibaba.com> |
||
---|---|---|
demos | ||
guides | ||
images | ||
releases | ||
.gitignore | ||
alignment.md | ||
architecture_diagrams.pptx | ||
architecture.md | ||
CODEOWNERS | ||
LICENSE | ||
overview.md | ||
quickstart.md | ||
README.md | ||
roadmap.md | ||
threats_overview.md | ||
trust_model_personas.md | ||
trust_model.md |
Confidential Containers Documentation
Confidential Containers is an open source community working to leverage Trusted Execution Environments to protect containers and data and to deliver cloud native confidential computing.
We have a new release every 6 weeks! See Release Notes or Quickstart Guide
Our key considerations are:
- Allow cloud native application owners to enforce application security requirements
- Transparent deployment of unmodified containers
- Support for multiple TEE and hardware platforms
- A trust model which separates Cloud Service Providers (CSPs) from guest applications
- Least privilege principles for the Kubernetes cluster administration capabilities which impact delivering Confidential Computing for guest applications or data inside the TEE
Further Detail
Associated Repositories
- Kubernetes Operator for Confidential Computing : An operator to deploy confidential containers runtime (and required configs) on a Kubernetes cluster