From 4ef145115b9b15c91485568a8e58b80558bd7828 Mon Sep 17 00:00:00 2001 From: Moritz Eckert Date: Wed, 17 Apr 2024 11:41:10 +0200 Subject: [PATCH] docs: revise intro page --- docs/docs/intro.md | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/docs/docs/intro.md b/docs/docs/intro.md index d7c376efe1..99dda249ce 100644 --- a/docs/docs/intro.md +++ b/docs/docs/intro.md @@ -5,7 +5,7 @@ id: intro # Contrast -Contrast runs confidential container deployments on Kubernetes at scale. +Welcome to the documentation of Contrast! Contrast runs confidential container deployments on Kubernetes at scale. Contrast is based on the [Kata Containers](https://github.com/kata-containers/kata-containers) and [Confidential Containers](https://github.com/confidential-containers) projects. @@ -13,6 +13,10 @@ Confidential Containers are Kubernetes pods that are executed inside a confident This works with unmodified containers in a lift-and-shift approach. Contrast currently targets the [CoCo preview on AKS](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-on-aks-preview). +:::tip +See the 📄[whitepaper](https://content.edgeless.systems/hubfs/Confidential%20Computing%20Whitepaper.pdf) for more information on confidential computing. +::: + ## Goal Contrast is designed to keep all data always encrypted and to prevent access from the infrastructure layer. It removes the infrastructure provider from the trusted computing base (TCB). This includes access from datacenter employees, privileged cloud admins, own cluster administrators, and attackers coming through the infrastructure, for example, malicious co-tenants escalating their privileges. @@ -21,9 +25,15 @@ Contrast integrates fluently with the existing Kubernetes workflows. It's compat ## Use Cases +Contrast provides unique security [features](basics/features.md) and [benefits](basics/security-benefits.md). The core use cases are: + * Increasing the security of your containers * Moving sensitive workloads from on-prem to the cloud with Confidential Computing * Shielding the code and data even from the own cluster administrators * Increasing the trustworthiness of your SaaS offerings * Simplifying regulatory compliance * Multi-party computation for data collaboration + +## Next steps + +You can learn more about the concept of Confidential Containers, features, security benefits, and performance of Constellation in the *Basics* section. To jump right into the action head to *Getting started*.