bpradipt / awesome-confidential-computing
Collection of resources on Confidential Computing
☆20Updated 2 years ago
Related projects: ⓘ
- Documentation for the confidential containers project☆73Updated last year
- Confidential Containers Community☆176Updated this week
- Operator to deploy confidential containers runtime☆107Updated last week
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆52Updated last month
- Process-based Confidential Container Runtime☆74Updated this week
- Confidential Containers Guest Tools and Components☆81Updated this week
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆16Updated 3 weeks ago
- Generic Attestation Service☆39Updated 10 months ago
- Attestation and Secret Delivery Components☆58Updated this week
- Ability to create Kata pods using cloud provider APIs aka the peer-pods approach☆47Updated this week
- The project has been moved to CC-API organization. For more information:☆24Updated 5 months ago
- ☆17Updated 3 weeks ago
- Kubernetes Device Plugin for Intel SGX☆67Updated last year
- Seamlessly use VM based TEEs with Kubernetes for data-in use protection☆36Updated 3 years ago
- The project focuses on Intel’s enterprise AI and cloud native foundation for Red Hat OpenShift Container Platform (RHOCP) solution enable…☆17Updated this week
- Trusted Service Identity is closing the gap of preventing access to secrets by an untrusted operator during the process of obtaining auth…☆27Updated last year
- AI cloud native pipeline for confidential and sustainable computing☆37Updated 2 weeks ago
- ☆56Updated this week
- A collection of community maintained NRI plugins☆54Updated this week
- ☆172Updated this week
- ☆37Updated last year
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆55Updated 3 months ago
- AMD SEV Tool☆79Updated last year
- Tool for managing the IBM Power Systems Virtual Servers☆37Updated this week
- Confidential Computing Consortium Governance Documents☆68Updated 2 weeks ago
- Tools and runtime for launching unmodified container images in Trusted Execution Environments☆142Updated 2 months ago
- Confidential Containers Shim Firmware☆91Updated this week
- COCONUT-SVSM☆107Updated this week
- Intent Driven Orchestration enables management of applications through their Service Level Objectives, while minimizing developer and adm…☆34Updated 2 weeks ago
- Intel confidential computing - TDX☆82Updated this week