Skip to content

Commit

Permalink
docs: revise intro page
Browse files Browse the repository at this point in the history
  • Loading branch information
m1ghtym0 committed Apr 17, 2024
1 parent b4dd54b commit 4ef1451
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion docs/docs/intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,18 @@ id: intro

# Contrast

Contrast runs confidential container deployments on Kubernetes at scale.
Welcome to the documentation of Contrast! Contrast runs confidential container deployments on Kubernetes at scale.

Contrast is based on the [Kata Containers](https://github.com/kata-containers/kata-containers) and
[Confidential Containers](https://github.com/confidential-containers) projects.
Confidential Containers are Kubernetes pods that are executed inside a confidential micro-VM and provide strong hardware-based isolation from the surrounding environment.
This works with unmodified containers in a lift-and-shift approach.
Contrast currently targets the [CoCo preview on AKS](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-on-aks-preview).

:::tip
See the 📄[whitepaper](https://content.edgeless.systems/hubfs/Confidential%20Computing%20Whitepaper.pdf) for more information on confidential computing.
:::

## Goal

Contrast is designed to keep all data always encrypted and to prevent access from the infrastructure layer. It removes the infrastructure provider from the trusted computing base (TCB). This includes access from datacenter employees, privileged cloud admins, own cluster administrators, and attackers coming through the infrastructure, for example, malicious co-tenants escalating their privileges.
Expand All @@ -21,9 +25,15 @@ Contrast integrates fluently with the existing Kubernetes workflows. It's compat

## Use Cases

Contrast provides unique security [features](basics/features.md) and [benefits](basics/security-benefits.md). The core use cases are:

* Increasing the security of your containers
* Moving sensitive workloads from on-prem to the cloud with Confidential Computing
* Shielding the code and data even from the own cluster administrators
* Increasing the trustworthiness of your SaaS offerings
* Simplifying regulatory compliance
* Multi-party computation for data collaboration

## Next steps

You can learn more about the concept of Confidential Containers, features, security benefits, and performance of Constellation in the *Basics* section. To jump right into the action head to *Getting started*.

0 comments on commit 4ef1451

Please sign in to comment.