Authenticated Registries
Use private registries with Confidential Containers
In addition to running pods inside of enclaves, Confidential Containers provides several other features that can be used to protect workloads and data. Securing complex workloads often requires using some of these features.
Most features depend on and require attestation, which is described in the next section.
Use private registries with Confidential Containers
Procedures to encrypt and consume OCI images in a TEE
Pull containers from self-hosted registries
Add protected volumes to a pod
Generate and deploy protected Kubernetes secrets
Procedures to generate and deploy signed OCI images with CoCo