diff --git a/src/pages/use-cases/index.md b/src/pages/use-cases/index.md index 3c9345f..9359c6f 100644 --- a/src/pages/use-cases/index.md +++ b/src/pages/use-cases/index.md @@ -53,7 +53,7 @@ In fact, in order to avoid interference, putting those tasks in Kata Containers ## AMD -With confidential computing, customers have to have absolute trust that data is not being exposed. In regulated environments, where governments are putting stricter rules like heath data in place, it has to be ascertained that the hypervisors can get access to the data, but it sees no value in it. Encryption plays a key role so the confidential or container based workloads can be coupled with the technologies that are coming out like AMD Secure Encrypted Virtualization (SEV). +With confidential computing, customers have to have absolute trust that data is not being exposed. In regulated environments, where governments are putting stricter rules like heath data in place, it has to be ascertained that the hypervisors can get access to the data, but it sees no value in it. Encryption plays a key role so the confidential or container based workloads can be coupled with the AMD Secure Encrypted Virtualization - Secure Nested Paging (SEV-SNP) family of technologies. Initially, Kata Containers had offered dedicated support for both SEV and SNP. However, since our customers' needs have evolved, SEV support has been deprecated, and the focus has shifted to the more advanced Secure Nested Paging (SNP), which builds on SEV by adding strong memory integrity protection to prevent malicious hypervisor-based attacks. With the 2018 Kata Containers prototype that AMD has had in place with the SEV technology, it’s been possible for AMD to offer confidentiality, meaning that they can turn it on and the containers would run in an encrypted mode. Teams at AMD are currently in the process of investing in Kata Containers. They are working with the community and teams at IBM to further explore needs and opportunities for confidential computing technology.