Skip to content
@confidential-containers

Confidential Containers

logo

CII Best Practices

Welcome to Confidential Containers

Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data.

Goals:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes Cluster administration capabilities which impact delivering Confidential Computing for guest application or data inside the TEE.

Find out more

Get started

Join the community


cncf-logo

Confidential Containers is a Cloud Native Computing Foundation sandbox project.

Pinned Loading

  1. confidential-containers confidential-containers Public

    Confidential Containers Community

    297 62

  2. operator operator Public

    Operator to deploy confidential containers runtime

    Go 148 70

  3. guest-components guest-components Public

    Confidential Containers Guest Tools and Components

    Rust 107 127

  4. cloud-api-adaptor cloud-api-adaptor Public

    Ability to create Kata pods using cloud provider APIs aka the peer-pods approach

    Go 62 116

  5. trustee trustee Public

    Attestation and Secret Delivery Components

    Rust 110 130

  6. enclave-cc enclave-cc Public

    Process-based Confidential Container Runtime

    Go 84 41

Repositories

Showing 10 of 23 repositories
  • cloud-api-adaptor Public

    Ability to create Kata pods using cloud provider APIs aka the peer-pods approach

    confidential-containers/cloud-api-adaptor’s past year of commit activity
    Go 62 Apache-2.0 116 194 (9 issues need help) 23 Updated Oct 11, 2025
  • guest-components Public

    Confidential Containers Guest Tools and Components

    confidential-containers/guest-components’s past year of commit activity
    Rust 107 Apache-2.0 127 64 19 Updated Oct 11, 2025
  • trustee Public

    Attestation and Secret Delivery Components

    confidential-containers/trustee’s past year of commit activity
    Rust 110 Apache-2.0 130 97 26 Updated Oct 10, 2025
  • trustee-operator Public

    Operator to manage the lifecycle of Trustee (KBS)

    confidential-containers/trustee-operator’s past year of commit activity
    Go 10 Apache-2.0 26 10 5 Updated Oct 9, 2025
  • confidential-containers Public

    Confidential Containers Community

    confidential-containers/confidential-containers’s past year of commit activity
    297 Apache-2.0 62 98 (1 issue needs help) 7 Updated Oct 8, 2025
  • confidentialcontainers.org Public

    Confidential Containers website

    confidential-containers/confidentialcontainers.org’s past year of commit activity
    SCSS 5 Apache-2.0 21 13 3 Updated Oct 3, 2025
  • operator Public

    Operator to deploy confidential containers runtime

    confidential-containers/operator’s past year of commit activity
    Go 148 Apache-2.0 70 58 (3 issues need help) 5 Updated Oct 1, 2025
  • kbs-types Public

    Rust (de)serializable types for KBS

    confidential-containers/kbs-types’s past year of commit activity
    Rust 2 Apache-2.0 32 0 0 Updated Sep 23, 2025
  • td-shim Public

    Confidential Containers Shim Firmware

    confidential-containers/td-shim’s past year of commit activity
    Rust 115 65 32 11 Updated Sep 9, 2025
  • qemu Public Forked from qemu/qemu

    Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.

    confidential-containers/qemu’s past year of commit activity
    C 0 6,376 0 0 Updated Jul 14, 2025

Most used topics

Loading…