Skip to content

Conversation

@anta5010
Copy link
Contributor

Before submitting a pull request for a new Learning Path, please review Create a Learning Path

  • I have reviewed Create a Learning Path

Please do not include any confidential information in your contribution. This includes confidential microarchitecture details and unannounced product information.

  • I have checked my contribution for confidential information

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the Creative Commons Attribution 4.0 International License.

… Arm CCA and Trustee) Learning Path

Signed-off-by: Anton Antonov <Anton.Antonov@arm.com>
@anta5010 anta5010 changed the title Add cca-kata (Run Confidentail Containers using using Arm CCA and Trustee) Learning Path Add cca-kata (Run Confidentail Containers using Arm CCA and Trustee) Learning Path Dec 11, 2025
@pareenaverma pareenaverma added the CCA Confidential Compute label Dec 12, 2025
@pareenaverma pareenaverma self-assigned this Dec 12, 2025
@pareenaverma
Copy link
Contributor

moved to draft and merging into main for tech review

@pareenaverma pareenaverma merged commit 1831ce1 into ArmDeveloperEcosystem:main Dec 17, 2025
2 checks passed
Copy link
Contributor

@paulhowardarm paulhowardarm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Excellent LP. Thanks, Anton. I was tempted to suggest we could do a little more concept explaining in the text. But thinking about it, we have probably progressed beyond the need to do too much of that, and we are correctly referencing earlier LPs that do more of this, so I think it's probably fine as it is. Most of my comments have ended up more editorial than technical.

@@ -0,0 +1,66 @@
---
title: Run Confidentail Containers with encrypted images using Arm CCA and Trustee

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: confidentail


learning_objectives:
- Overview of Confidential Containers
- Understand how Trustee services are used for CCA realm attestation to unlock the confidential processing of data.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nitpick: "CCA realm attestation" should either be expanded to "CCA realm and platform attestation" or contracted to just "CCA attestation" (rather than specifically saying "realm", due to the way that CCA attestation is partitioned into realm/platform, and we need to consider both).

learning_objectives:
- Overview of Confidential Containers
- Understand how Trustee services are used for CCA realm attestation to unlock the confidential processing of data.
- Use an encrypted image to deploy a Confidential Containers in a CCA realm on an Armv9-A AEM Base Fixed Virtual Platform (FVP) that has support for RME extensions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Grammar "a Confidential Containers"

---


## Confidentail Containers
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: "Confidentail"


## Design overview

Confidential computing projects are largely defined by what is inside the enclave and what is not.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggest we try to stabilise terminology, because we've just slid from "Trusted Execution Environments" to "enclave". I would introduce the term "Trusted Execution Environment (TEE)" in the opening paragraph, since it's fairly industry-standard now, and then use TEE throughout.

Confidential Containers also provides components inside the guest and elsewhere to facilitate attestation.
Attestation is a crucial part of confidential computing and a direct requirement of many guest operations.
For example, to unpack an encrypted container image, the guest must retrieve a secret key.
Inside the guest the **confidential-data-hub** and **attestation-agent** handle operations involving secrets and attestation.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's make sure we clearly link the terms to their acronyms that are used further down: introduce as "Confidential Data Hub (CDH)" and "Attestation Agent (AA)".

This is a simplified diagram of the attestation process
![Attestation alt-text#center](attestation.png "Attestation")

In this Learnig Path the attestation process will be used to obtain an encryption key required to decrypt a container image.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: Learnig

@@ -0,0 +1,304 @@
---
# User change
title: Run confidentail containers with encrypted images using Arm CCA and Trustee
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: confidentail

```
{{% /notice %}}

You have successfully run a confidentail container with Arm CCA using an encrypted image.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: confidentail

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CCA Confidential Compute tech_review

Projects

Status: In Progress

Development

Successfully merging this pull request may close these issues.

3 participants