Skip to content

Commit e6f7efe

Browse files
authored
Update confidential-containers-enclaves.md
1 parent 0663192 commit e6f7efe

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/confidential-computing/confidential-containers-enclaves.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: ignite-fall-2021
1616
[Confidential containers](confidential-containers.md) help you run existing unmodified container applications of most **common programming languages** runtimes (Python, Node, Java etc.) in the Intel SGX based Trusted Execution Environment(TEE).
1717
This packaging model typically does not need any source-code modifications or recompilation and is the fastest method to run in Intel SGX enclaves. Typical deployment process for running your standard docker containers requires an Open-Source SGX Wrapper or Azure Partner Solution.
1818
In this packaging and execution model each container application is loaded in the trusted boundary (enclave) and with a hardware-based isolation enforced by Intel SGX CPU. Each container running in an enclave receives its own memory encryption key delivered from the Intel SGX CPU.
19-
This model works well for off the shelf container applications available in the market or custom apps currently running on general purpose nodes
19+
This model works well for off the shelf container applications available in the market or custom apps currently running on general purpose nodes.
2020
To run an existing Docker container, applications on confidential computing nodes require an Intel Software Guard Extensions (SGX) wrapper software to help the container execution within the bounds of special CPU instruction set.
2121
SGX creates a direct execution to the CPU to remove the guest operating system (OS), host OS, or hypervisor from the trust boundary. This step reduces the overall surface attack areas and vulnerabilities while achieving process level isolation within a single node.
2222

0 commit comments

Comments
 (0)