Confidential container runtime for cloud-native confidential computing
Top 54.0% on sourcepulse
Inclavare Containers is a CNCF sandbox project providing a confidential container runtime for cloud-native confidential computing. It enables running sensitive workloads in hardware-assisted Trusted Execution Environments (TEEs) like Intel SGX, isolating them from untrusted infrastructure providers and insiders. The project aims to simplify the adoption of confidential computing for cloud-native applications.
How It Works
Inclavare Containers leverages OCI-compliant components, including rune
and shim-rune
, to interface with backend enclave runtimes like Occlum (a Library OS for Intel SGX) or WAMR. This architecture allows for hardware-enforced isolation, removing the Cloud Service Provider (CSP) from the tenant's Trusted Computing Base (TCB). It also includes an Enclave Attestation Architecture (EAA) with Rats-TLS for secure, cross-platform remote attestation, proving workload integrity.
Quick Start & Requirements
make
within a Docker development environment. Pre-built RPM/DEB packages are also available.containerd
, dockerd
, and pouchd
.Highlighted Details
rune
) and containerd
shim v2 support (shim-rune
).Maintenance & Community
Licensing & Compatibility
Limitations & Caveats
2 years ago
1 day