Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 2. New features and enhancements
This section describes new features and enhancements introduced in OpenShift sandboxed containers 1.12.
- Confidential containers on bare metal
In this update, OpenShift sandboxed containers on bare-metal servers now support encrypted persistent volumes, providing a secure, durable storage solution for sensitive workloads. This enhancement addresses the demand for data persistence within sandboxed environments while ensuring that data remains encrypted at rest.
Key enhancements in this release include:
- Encrypted block volumes: You can now encrypt, decrypt and mount block volumes directly within the confidential container using raw block volumes. This ensures that encryption and decryption happen inside the Trusted Execution Environment (TEE) rather than at the worker node level, maintaining data confidentiality throughout the storage lifecycle.
- Red Hat build of Trustee 1.1.0 is now generally available and is the recommended version for use with OpenShift sandboxed containers 1.12.
Simplified Trustee configuration: Deployment of Red Hat build of Trustee is significantly simplified through the new
TrusteeConfigcustom resource. Key features include:-
Automated resource generation: Automatically generates required secrets, config maps, and the
KbsConfigresource. - Profile-based configuration: Offers a Permissive profile for quick-start development and a Restricted profile for production-grade security.
-
Service exposure options: Support for
ClusterIP,NodePort, andLoadBalancerby using thekbsServiceTypefield. - Platform-specific extensions: Native support for IBM Secure Execution, Intel TDX, and disconnected (air-gapped) environments.
-
Automated resource generation: Automatically generates required secrets, config maps, and the
Pre-built
initramfs: Initial RAM File System (initramfs) images are now pre-built and provide known Measurement Hashes. Hardware evaluatesinitramfscontents before booting the confidential virtual machine, makinginitramfsa critical link in the chain of trust. Pre-built images eliminate the need for runtime builds that could be compromised.These improvements aim at simplifying the deployment and management of storage and security resources so that end users can manage their confidential container workloads on bare metal more effectively.