Authenticated Registries
Use private OCI registries
In addition to running pods inside of enclaves, Confidential Containers provides several other features that can be used to protect workloads and data. Securing complex workloads often requires using some of these features.
Most features depend on and require attestation, which is described in the next section.
Use private OCI registries
Procedures to encrypt and consume OCI images in a TEE
Pull containers from self-hosted registries
Add protected volumes to a pod
Generate and deploy protected Kubernetes secrets
Procedures to generate and deploy signed OCI images with CoCo