-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Research and Understanding Confidential Containers #337
Comments
Confidential Containers OverviewConfidential containers provide cloud-native confidential computing by leveraging Trusted Execution Environments (TEEs). Their primary goal is to integrate existing TEE infrastructure with cloud-native technologies, creating a trust model that separates Cloud Service Providers (CSPs) from guest applications. Kata Containers and Confidential ContainersKata Containers utilize TEEs to ensure container isolation. Confidential containers build on this foundation to enable pod-level support for confidential computing in cloud-native architectures. Cloud-Native Execution EnvironmentConfidential containers aim to:
Confidential Containers StackThe Confidential Containers stack consists of: Requirements
WorkflowPre-Workload Steps:
Running the Workload:
Flavours
Integration with confidential containersKey Participants:
Sample integration architecture |
Is your feature request related to a problem? Please describe.
Limited team knowledge about Confidential Containers (CC) and their core components, which is crucial for secure containerized deployments.
Describe the feature you are requesting, as well as the possible use case(s) for it.
Comprehensive research and team alignment on Confidential Containers:
Indicate the importance of this feature to you.
Must-have
Anything else?
The text was updated successfully, but these errors were encountered: