logo

Confidential Containers Explained

2022-05-18

Authors:   James Magowan, Samuel Ortiz


Summary

Confidential Containers enable cloud native confidential computing by standardizing confidential computing at the container level, allowing users to deploy confidential workloads using familiar workflows and tools. The project aims to seamlessly run Kubernetes workloads in their own confidential computing enclaves, taking the infrastructure owner out of the trust boundary and providing potential use cases for running sensitive workloads anywhere confidential computing is enabled.
  • Confidential Containers is an open source project that standardizes confidential computing at the container level
  • The project aims to seamlessly run Kubernetes workloads in their own confidential computing enclaves
  • Confidential Containers takes the infrastructure owner out of the trust boundary, providing potential use cases for running sensitive workloads anywhere confidential computing is enabled
  • The project is expanding to include the attestation side and adding secure storage
  • The first official release is expected in a few months
Confidential Containers allows users to run their sensitive workloads anywhere confidential computing is enabled, providing a secure way to move workloads from private to public clouds. This is particularly useful for companies who may not want their infrastructure owner to have access to their workloads, even internally. By taking the infrastructure owner out of the trust boundary, Confidential Containers provides a potential solution to this problem.

Abstract

Confidential Containers (https://github.com/confidential-containers) enable cloud native confidential computing (https://confidentialcomputing.io/faq/) leveraging a variety of hardware platforms and technologies, standardising the confidential computing at the container level, helping users to deploy confidential workloads using already familiar workflows and tools; and in this Panel we're bringing together contributors from different hardware vendors, different projects (in different layers of the stack), and different companies to discuss and answer questions about this new complex technology. Topics for discussion will include: * How do we realise the benefits of cloud native confidential computing? * What impact is there to the Cloud Native User Experience? * What new considerations/concepts does confidential containers introduce? Note that this panel is a follow-up on what has been developed since https://www.youtube.com/watch?v=zTn9Xt1k1OA was presented.Click here to view captioning/translation in the MeetingPlay platform!

Materials: