mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
Re-write Intro/Welcome (#97)
Co-authored-by: Moritz Eckert <m1gh7ym0@gmail.com>
This commit is contained in:
parent
e3c5a5ab78
commit
0286a83dfa
@ -3,3 +3,4 @@ https://github.com/edgelesssys/constellation-
|
||||
https://github.com/edgelesssys/wiki/blob/master/documentation/constellation/customer-onboarding.md
|
||||
https://github.com/edgelesssys/wiki/blob/master/documentation/rebasing_forks.md
|
||||
https://public-edgeless-constellation.s3.us-east-2.amazonaws.com
|
||||
https://portal.azure.com
|
||||
|
@ -1,51 +1,30 @@
|
||||
---
|
||||
slug: /
|
||||
id: intro
|
||||
---
|
||||
# Introduction
|
||||
|
||||
# Welcome to Constellation! 🎉
|
||||
Welcome to the documentation of Constellation! Constellation is a Kubernetes engine that aims to provide the best possible data security.
|
||||
|
||||
Constellation is the first Confidential Kubernetes platform!
|
||||
Constellation leverages confidential computing to isolate entire Kubernetes clusters and all workloads from the rest of the cloud infrastructure.
|
||||
From the inside, it's a fully-featured, [certified](https://www.cncf.io/certification/software-conformance/), Kubernetes engine.
|
||||
From the outside, it's an end to end isolated, always encrypted stronghold. A Confidential Cloud in the public cloud.
|
||||
Constellation is open source and enterprise-ready, tailored for unleashing the power of confidential computing for all your workloads at scale.
|
||||
![Constellation concept](../static/img/concept.svg)
|
||||
|
||||
For a brief introduction to the Confidential Kubernetes concept, read the [introduction](overview/confidential-kubernetes.md).
|
||||
For more elaborate overviews of Constellation's, see the [architecture](architecture/overview.md) section.
|
||||
Constellation shields your entire Kubernetes cluster from the underlying cloud infrastructure. Everything inside is always encrypted, including at runtime in memory. For this, Constellation leverages a technology called *confidential computing* and more specifically Confidential VMs.
|
||||
|
||||
![Constellation](_media/product-overview.png)
|
||||
:::tip
|
||||
See our 📄[whitepaper](https://content.edgeless.systems/hubfs/Confidential%20Computing%20Whitepaper.pdf) for more information on confidential computing.
|
||||
:::
|
||||
|
||||
## Features
|
||||
## Goals
|
||||
|
||||
Constellation's main features are:
|
||||
From a security perspective, Constellation is designed to keep all data always encrypted and to prevent any access from the underlying (cloud) infrastructure. This includes access from datacenter employees, privileged cloud admins, and attackers coming through the infrastructure. Such attackers could be malicious co-tenants escalating their privileges or hackers who managed to compromise a cloud server.
|
||||
|
||||
* The only cloud agnostic Confidential Kubernetes platform
|
||||
* Verifiable integrity and confidentiality protection of the entire Kubernetes cluster
|
||||
* High-available, enterprise-ready Kubernetes engine
|
||||
* Memory runtime encryption of all Kubernetes nodes
|
||||
* Network encryption for the node to node traffic. Including the pod network.
|
||||
* [Persistent volume](https://kubernetes.io/docs/concepts/storage/persistent-volumes/) encryption for block storage
|
||||
* Key management for transparent network and storage encryption
|
||||
* CC-optimized, fully measured, and integrity-protected node OS
|
||||
* Kubernetes node attestation
|
||||
* Dynamic cluster autoscaling with autonomous node attestation
|
||||
* Supply chain protection with [sigstore](https://www.sigstore.dev/)
|
||||
From a DevOps perspective, Constellation is designed to work just like what you would expect from a modern Kubernetes engine.
|
||||
|
||||
## Getting started
|
||||
## Use cases
|
||||
|
||||
Sounds great, how can I try this?
|
||||
Constellation provides unique security [features](overview/confidential-kubernetes.md) and [benefits](overview/security-benefits.md). The core use cases are:
|
||||
|
||||
Constellation can be [deployed](getting-started/install.md) in minutes to your favorite infrastructure provider :rocket:
|
||||
* Increasing the overall security of your clusters
|
||||
* Increasing the trustworthiness of your SaaS offerings
|
||||
* Moving sensitive workloads from on-prem to the cloud
|
||||
* Meeting regulatory requirements
|
||||
|
||||
## Where does it fit
|
||||
## Next steps
|
||||
|
||||
Constellation is the Kubernetes platform for secure, confidential cloud computing.
|
||||
When moving workloads to the cloud most enterprises are facing the following challenges:
|
||||
|
||||
* How to **prevent unauthorized access** from hackers, cloud administrators, or governments?
|
||||
* How to **ensure compliance** with privacy laws (e.g. GDPR) and industry-specific regulation (e.g. HIPAA)?
|
||||
* How to **implement cloud security at the root** -- without simply adding "yet another tool"?
|
||||
|
||||
Constellation is designed to fundamentally change the playing field when it comes to cloud migration.
|
||||
By leveraging confidential computing hardware capabilities it solves these challenges at the root.
|
||||
You can learn more about the concept of Confidential Kubernetes, features, security benefits, and performance of Constellation in the *Basics* section. To jump right into the action head to *Getting Started*.
|
||||
|
@ -20,12 +20,12 @@ const sidebars = {
|
||||
docs: [
|
||||
{
|
||||
type: 'doc',
|
||||
label: 'Welcome to Constellation',
|
||||
label: 'Introduction',
|
||||
id: 'intro'
|
||||
},
|
||||
{
|
||||
type: 'category',
|
||||
label: 'Overview',
|
||||
label: 'Basics',
|
||||
link: {
|
||||
type: 'generated-index',
|
||||
},
|
||||
|
@ -34,5 +34,6 @@ unspoofable
|
||||
updatable
|
||||
proxied
|
||||
[Ww]alkthrough
|
||||
whitepaper
|
||||
WireGuard
|
||||
Xeon
|
||||
|
Loading…
Reference in New Issue
Block a user