You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-containers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Below are the qualities of confidential containers:
22
22
23
23
- Allows running existing standard container images with no code changes (lift-and-shift) within a TEE
24
24
- Ability to extend/build new applications that have confidential computing awareness
25
-
- Allows to remotely challenge the runtime environment for cryptographic proof that states what was initiated as reported by the secure processer
25
+
- Allows to remotely challenge runtime environment for cryptographic proof that states what was initiated as reported by the secure processor
26
26
- Provides strong assurances of data confidentiality, code integrity and data integrity in a cloud environment with hardware based confidential computing offerings
27
27
- Helps isolate your containers from other container groups/pods, as well as VM node OS kernel
0 commit comments