{"id":156338,"date":"2025-10-20T07:30:00","date_gmt":"2025-10-20T05:30:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=156338"},"modified":"2025-10-08T11:46:21","modified_gmt":"2025-10-08T09:46:21","slug":"from-open-source-project-to-secure-enterprise-solution","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/from-open-source-project-to-secure-enterprise-solution\/","title":{"rendered":"From Open Source Project to Secure Enterprise Solution"},"content":{"rendered":"<p>Confidential Containers is an open source sandbox project of the Cloud Native Computing Foundation that enables cloud-native confidential computing. Confidential Containers builds on hardware security technologies and combines them with new software frameworks to increase the security of the user data used. As part of the project, confidential computing was standardized at container level and its use in Kubernetes was simplified. <\/p>\n\n\n\n<p>This allows Kubernetes users to deploy secure container workloads with familiar workflows and tools without extensive knowledge of confidential computing technologies. Renowned providers have supported the project from the outset. Red Hat offers the OpenShift Confidential Containers feature based on Red Hat OpenShift Sandboxed Containers. It extends the security functions of OpenShift. This enables companies to provide and manage confidential workloads with improved data protection. <\/p><div id=\"great-2286732455\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>OpenShift Confidential Containers is now also generally available on Microsoft Azure. This enables companies to reliably protect their sensitive applications and data on Azure. Security is significantly increased as the workloads are isolated in a hardware-protected, trusted execution environment and the data is protected from external access and remains encrypted even during processing.<\/p>\n\n\n\n<p>A key feature of Confidential Containers is the integration of the Trusted Execution Environment infrastructure into the cloud-native world. A TEE is a hardware-based, isolated environment with increased security. It also forms the basis for OpenShift Confidential Containers in combination with a special virtual machine called \"Confidential Virtual Machine\" (CVM), which is executed within the TEE. The solution uses CVMs to run pods, creating a confidential container for the secure execution of workloads.<\/p>\n\n\n\n<p>Another important feature of Confidential Containers is attestation, a process for checking whether the target TEE on which the workloads are to be executed is actually trustworthy. By combining TEE and attestation, Confidential Containers provides a secure environment and protects code and data from access by privileged users such as administrators. Remote attestation is used here to separate the responsibility of the cloud operator and the attestation, thus further increasing security. <\/p>\n\n\n\n<p>The technological complexity has no impact on the user, as all functions are provided automatically via OpenShift Confidential Containers.<br>Typical use cases for the use of confidential containers can be found in a wide range of industries. The same applies to the SAP integration of business-critical, containerized processes with high security and privacy requirements. Confidential containers are the ideal environment for secure AI model training with confidential data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Support for bare metal servers<\/h2>\n\n\n\n\n\n\n\n<p>The OpenShift Confidential Containers solution is under continuous development and Red Hat plans to support additional environments, including bare metal servers, additional public clouds and managed services. New features will also be introduced, such as support for Confidential GPUs, with a particular focus on joint attestation of the CPU and GPU. <\/p>\n\n\n\n<p>Overall, however, the open source project Confidential Containers and the rapid deployment of curated solutions such as OpenShift Confidential Containers or Confidential Containers on Microsoft Azure already make one thing abundantly clear today: open source should not be missing from any enterprise architecture and platform decision or modernization strategy in terms of future-proofing.<\/p>\n\n\n\n<p>Continue to the partner entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/e3mag.com\/de\/partners\/redhat\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"515\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK.jpg\" alt=\"\" class=\"wp-image-137426\" style=\"width:274px;height:auto\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-400x258.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-768x494.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-100x64.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-480x309.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-640x412.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-720x464.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-18x12.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2021\/03\/RedHat-Logo-B-Color-CMYK-600x386.jpg 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>There is further proof of the open source success story: Confidential Containers are now available on a public cloud. A community project has quickly become an enterprise-grade solution for critical processes. <\/p>","protected":false},"author":1906,"featured_media":147188,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,44297,22],"tags":[],"coauthors":[36603],"class_list":["post-156338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-mag-25-10","category-open-source","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/open_source_kol_red_hat_1000x450-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>F\u00fcr die Open-Source-Erfolgsstory gibt es einen weiteren Beleg: Confidential Containers sind nun auf einer Public Cloud verf\u00fcgbar. Aus einem Community-Projekt wurde in kurzer Zeit eine unternehmenstaugliche L\u00f6sung f\u00fcr kritische Prozesse. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-25-10\/\" rel=\"category tag\">MAG 25-10<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/open-source\/\" rel=\"category tag\">Open Source Kolumne<\/a>","author_info_v2":{"name":"Peter K\u00f6rner, Red Hat","url":"https:\/\/e3mag.com\/en\/author\/peter-koerner-red-hat\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/156338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1906"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=156338"}],"version-history":[{"count":9,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/156338\/revisions"}],"predecessor-version":[{"id":156464,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/156338\/revisions\/156464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/147188"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=156338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=156338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=156338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=156338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}