Skip to content

Commit b53b914

Browse files
authored
Merge pull request #516 from butler54/coco-updates
fix: incremental updates to the coco-pattern documentation
2 parents 7b33ff4 + fbbea9c commit b53b914

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

content/patterns/coco-pattern/_index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ include::modules/comm-attributes.adoc[]
2424
= About coco-pattern
2525

2626
Confidential computing is a technology for securing data in use. It uses a https://en.wikipedia.org/wiki/Trusted_execution_environment[Trusted Execution Environment] provided within the hardware of the processor to prevent access from others who have access to the system.
27-
https://confidentialcontainers.org/[Confidential containers] is a project to standardize the consumption of confidential computing by making the security boundary for confidential computing to be a Kubernetes pod. [Kata containers](https://katacontainers.io/) is used to establish the boundary via a shim VM.
27+
https://confidentialcontainers.org/[Confidential containers] is a project to standardize the consumption of confidential computing by making the security boundary for confidential computing to be a Kubernetes pod. https://katacontainers.io/[Kata containers] is used to establish the boundary via a shim VM.
2828

2929
A core goal of confidential computing is to use this technology to isolate the workload from both Kubernetes and hypervisor administrators.
3030

content/patterns/coco-pattern/coco-pattern-getting-started.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Logging into azure once the pods have been provisioned will show that each of th
4242

4343
=== `oc exec` testing
4444

45-
In a OpenShift cluster without confidential containers, Role Based Access Control (RBAC), may be used to prevent users from execing into a container to mutate it.
45+
In a OpenShift cluster without confidential containers, Role Based Access Control (RBAC), may be used to prevent users from using `oc exec` to access a container container to mutate it.
4646
However:
4747

4848
1. Cluster admins can always circumvent this capability

0 commit comments

Comments
 (0)