Red Hat OpenShift sandboxed containers 1.10 has been released, bringing enhanced security and isolation capabilities to your Red Hat OpenShift environments. This marks the general availability of confidential containers on Microsoft Azure, and introduces the new Red Hat build of Trustee, which provides attestation services so your confidential workloads can run with integrity in the cloud.
OpenShift sandboxed containers delivers a lightweight and powerful way to run workloads in isolation. Confidential containers add an additional layer for hardware-protected environments, leveraging Trusted Execution Environments (TEE) to enable containerized confidential computing. With version 1.10, we continue our commitment to helping organizations protect sensitive data in use, improve workload isolation, and meet stringent compliance requirements, all while embracing the flexibility of cloud-native applications and multi-cloud deployments.
A new era of trusted execution
Additionally, Red Hat build of Trustee is now generally available. This is a new product built on the innovative upstream Trustee project, providing progressive solutions for TEE, and is a key part of Red Hat's confidential computing effort to protect customer data while in use.
Red Hat build of Trustee offers a comprehensive solution for applications requiring strong integrity and confidentiality guarantees, extending the security posture of your deployments. By leveraging the principles of the Trustee project, you can run sensitive workloads with increased confidence, knowing your data is protected even while it's being processed.
Together, the Red Hat build of Trustee and confidential containers on OpenShift form a robust solution to more securely isolate workloads, even in untrusted environments.
What's new in confidential containers with Red Hat OpenShift sandboxed containers 1.10
This release introduces several key improvements and new functionalities both for confidential containers and for Red Hat build of Trustee:
- Integrity protection: Prevents unauthorized changes to the confidential virtual machine (CVM) disk by verifying its integrity, even when accessed outside the secure environment. This helps ensure sensitive workloads remain trusted and uncompromised, helping protect your business from advanced threats, maintain compliance, and safeguard operational continuity
- Secure workload initialization: Allows you to provide trusted configuration data at startup, ensuring that each confidential container is launched with verified, tamper-proof settings
- Sealed secrets: Sensitive data is encapsulated and only made available inside a trusted execution environment (TEE) after verifying its integrity. This protects sensitive data from unauthorized access, reduces risk, and supports compliance in untrusted environments
- Secure cloud bursting: Extend your on-premises OpenShift cluster to run confidential workloads in Azure while maintaining data protection and compliance in the cloud. This enables flexible, scalable use of public cloud resources for sensitive workloads, without compromising security or trust
For a complete list of features and additional technical information, read Deploy sensitive workloads with Confidence: OpenShift confidential containers.
Support for confidential containers on Microsoft Azure
You can now confidently run your most sensitive, containerized workloads on Microsoft Azure with the general availability of confidential containers capabilities on OpenShift. This powerful feature, previously in technology preview, enables data to stay encrypted and isolated even during processing, reducing risk and supporting compliance in the cloud. Soon, this capability will also be fully supported for managed OpenShift customers through Azure Red Hat OpenShift, making it even easier to protect your workloads at scale.
Unlock the value of confidential computing
It's time to explore OpenShift sandboxed containers 1.10, the Red Hat build of Trustee, and confidential containers on OpenShift for Azure, to find out how they can protect your most sensitive workloads and strengthen your cloud strategy. Stay tuned for additional in-depth resources and documentation coming soon. Start unlocking the power of confidential computing today, and speak with your Red Hat representative or try it now at try.openshift.com.
product trial
Red Hat OpenShift Container Platform | 제품 체험판
저자 소개
Marcos Entenza, a.k.a Mak, works on the core Red Hat OpenShift Container Platform for hybrid and multi-cloud environments to enable customers to run Red Hat OpenShift anywhere. Mak is an experienced Product Manager passionate about building scalable infrastructures and he oversees installation, provider integration, and confidential computing on OpenShift.
Jens Freimann is a Software Engineering Manager at Red Hat with a focus on OpenShift sandboxed containers and Confidential Containers. He has been with Red Hat for more than six years, during which he has made contributions to low-level virtualization features in QEMU, KVM and virtio(-net). Freimann is passionate about Confidential Computing and has a keen interest in helping organizations implement the technology. Freimann has over 15 years of experience in the tech industry and has held various technical roles throughout his career.
유사한 검색 결과
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래