Cloud Hardware

Confidential Containers on the Cloud

Confidential Containers can be deployed via confidential computing cloud offerings. The main method of doing this is to use the cloud-api-adaptor also known as “peer pods.”

Some clouds also support starting confidential VMs inside of non-confidential VMs. With Confidential Containers these offerings can be used as if they were bare-metal.

Last modified November 12, 2024: docs: add getting-started guide (fadaa37)