Skip to content

bpradipt/awesome-confidential-computing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Awesome Confidential Computing

Collection of materials to help with the understanding of this fascinating technology.

Big Picture

Confidential computing protects your workload from unauthorised entities — the host or hypervisor, system administrators, service providers, other VMs, and processes on the host.

A Trusted Execution Environment (TEE) is at the heart of a confidential computing solution. TEEs are secure and isolated environments provided by confidential computing (CC) enabled hardware that prevents unauthorised access or modification of applications and data while in use

The following diagram provides a logical view of confidential computing solution. This can be used as a mental model to have a better understanding of the technology.

Source: Understanding a confidential computing solution

Overview

Hardware with CC support

Operating System with CC support

CC Software Stack (Opensource)

Attestation

Products and Offerings

Misc

About

Collection of resources on Confidential Computing

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published