Skip to content
@confidential-containers

Confidential Containers

logo

CII Best Practices

Welcome to Confidential Containers

Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data.

Goals:

  • Allow cloud native application owners to enforce application security requirements
  • Transparent deployment of unmodified containers
  • Support for multiple TEE and hardware platforms
  • A trust model which separates Cloud Service Providers (CSPs) from guest applications
  • Least privilege principles for the Kubernetes Cluster administration capabilities which impact delivering Confidential Computing for guest application or data inside the TEE.

Find out more

Get started

Join the community


cncf-logo

Confidential Containers is a Cloud Native Computing Foundation sandbox project.

Pinned Loading

  1. confidential-containers confidential-containers Public

    Confidential Containers Community

    294 61

  2. operator operator Public

    Operator to deploy confidential containers runtime

    Go 148 70

  3. guest-components guest-components Public

    Confidential Containers Guest Tools and Components

    Rust 104 125

  4. cloud-api-adaptor cloud-api-adaptor Public

    Ability to create Kata pods using cloud provider APIs aka the peer-pods approach

    Go 60 112

  5. trustee trustee Public

    Attestation and Secret Delivery Components

    Rust 107 127

  6. enclave-cc enclave-cc Public

    Process-based Confidential Container Runtime

    Go 84 41

Repositories

Showing 10 of 23 repositories
  • trustee Public

    Attestation and Secret Delivery Components

    confidential-containers/trustee’s past year of commit activity
    Rust 107 Apache-2.0 127 95 18 Updated Sep 26, 2025
  • operator Public

    Operator to deploy confidential containers runtime

    confidential-containers/operator’s past year of commit activity
    Go 148 Apache-2.0 70 59 (3 issues need help) 4 Updated Sep 25, 2025
  • cloud-api-adaptor Public

    Ability to create Kata pods using cloud provider APIs aka the peer-pods approach

    confidential-containers/cloud-api-adaptor’s past year of commit activity
    Go 60 Apache-2.0 112 192 (9 issues need help) 17 Updated Sep 25, 2025
  • trustee-operator Public

    Operator to manage the lifecycle of Trustee (KBS)

    confidential-containers/trustee-operator’s past year of commit activity
    Go 10 Apache-2.0 24 10 4 Updated Sep 25, 2025
  • confidential-containers Public

    Confidential Containers Community

    confidential-containers/confidential-containers’s past year of commit activity
    294 Apache-2.0 61 105 (1 issue needs help) 7 Updated Sep 25, 2025
  • guest-components Public

    Confidential Containers Guest Tools and Components

    confidential-containers/guest-components’s past year of commit activity
    Rust 104 Apache-2.0 125 64 19 Updated Sep 24, 2025
  • kbs-types Public

    Rust (de)serializable types for KBS

    confidential-containers/kbs-types’s past year of commit activity
    Rust 2 Apache-2.0 32 0 0 Updated Sep 24, 2025
  • confidentialcontainers.org Public

    Confidential Containers website

    confidential-containers/confidentialcontainers.org’s past year of commit activity
    SCSS 5 Apache-2.0 21 19 3 Updated Sep 16, 2025
  • td-shim Public

    Confidential Containers Shim Firmware

    confidential-containers/td-shim’s past year of commit activity
    Rust 114 64 32 10 Updated Sep 10, 2025
  • qemu Public Forked from qemu/qemu

    Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.

    confidential-containers/qemu’s past year of commit activity
    C 0 6,348 0 0 Updated Jul 15, 2025

Most used topics

Loading…