Red Hat OpenShift sandboxed containers 1.10 has been released, bringing enhanced security and isolation capabilities to your Red Hat OpenShift environments. This marks the general availability of confidential containers on Microsoft Azure, and introduces the new Red Hat build of Trustee, which provides attestation services so your confidential workloads can run with integrity in the cloud.
OpenShift sandboxed containers delivers a lightweight and powerful way to run workloads in isolation. Confidential containers add an additional layer for hardware-protected environments, leveraging Trusted Execution Environments (TEE) to enable containerized confidential computing. With version 1.10, we continue our commitment to helping organizations protect sensitive data in use, improve workload isolation, and meet stringent compliance requirements, all while embracing the flexibility of cloud-native applications and multi-cloud deployments.
A new era of trusted execution
Additionally, Red Hat build of Trustee is now generally available. This is a new product built on the innovative upstream Trustee project, providing progressive solutions for TEE, and is a key part of Red Hat's confidential computing effort to protect customer data while in use.
Red Hat build of Trustee offers a comprehensive solution for applications requiring strong integrity and confidentiality guarantees, extending the security posture of your deployments. By leveraging the principles of the Trustee project, you can run sensitive workloads with increased confidence, knowing your data is protected even while it's being processed.
Together, the Red Hat build of Trustee and confidential containers on OpenShift form a robust solution to more securely isolate workloads, even in untrusted environments.
What's new in confidential containers with Red Hat OpenShift sandboxed containers 1.10
This release introduces several key improvements and new functionalities both for confidential containers and for Red Hat build of Trustee:
- Integrity protection: Prevents unauthorized changes to the confidential virtual machine (CVM) disk by verifying its integrity, even when accessed outside the secure environment. This helps ensure sensitive workloads remain trusted and uncompromised, helping protect your business from advanced threats, maintain compliance, and safeguard operational continuity
- Secure workload initialization: Allows you to provide trusted configuration data at startup, ensuring that each confidential container is launched with verified, tamper-proof settings
- Sealed secrets: Sensitive data is encapsulated and only made available inside a trusted execution environment (TEE) after verifying its integrity. This protects sensitive data from unauthorized access, reduces risk, and supports compliance in untrusted environments
- Secure cloud bursting: Extend your on-premises OpenShift cluster to run confidential workloads in Azure while maintaining data protection and compliance in the cloud. This enables flexible, scalable use of public cloud resources for sensitive workloads, without compromising security or trust
For a complete list of features and additional technical information, read Deploy sensitive workloads with Confidence: OpenShift confidential containers.
Support for confidential containers on Microsoft Azure
You can now confidently run your most sensitive, containerized workloads on Microsoft Azure with the general availability of confidential containers capabilities on OpenShift. This powerful feature, previously in technology preview, enables data to stay encrypted and isolated even during processing, reducing risk and supporting compliance in the cloud. Soon, this capability will also be fully supported for managed OpenShift customers through Azure Red Hat OpenShift, making it even easier to protect your workloads at scale.
Unlock the value of confidential computing
It's time to explore OpenShift sandboxed containers 1.10, the Red Hat build of Trustee, and confidential containers on OpenShift for Azure, to find out how they can protect your most sensitive workloads and strengthen your cloud strategy. Stay tuned for additional in-depth resources and documentation coming soon. Start unlocking the power of confidential computing today, and speak with your Red Hat representative or try it now at try.openshift.com.
product trial
Red Hat OpenShift Container Platform | Versione di prova del prodotto
Sugli autori
Marcos Entenza, a.k.a Mak, works on the core Red Hat OpenShift Container Platform for hybrid and multi-cloud environments to enable customers to run Red Hat OpenShift anywhere. Mak is an experienced Product Manager passionate about building scalable infrastructures and he oversees installation, provider integration, and confidential computing on OpenShift.
Jens Freimann is a Software Engineering Manager at Red Hat with a focus on OpenShift sandboxed containers and Confidential Containers. He has been with Red Hat for more than six years, during which he has made contributions to low-level virtualization features in QEMU, KVM and virtio(-net). Freimann is passionate about Confidential Computing and has a keen interest in helping organizations implement the technology. Freimann has over 15 years of experience in the tech industry and has held various technical roles throughout his career.
Altri risultati simili a questo
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Virtualizzazione
Il futuro della virtualizzazione negli ambienti aziendali per i carichi di lavoro on premise o nel cloud