August 5, 2020 By Rob Spencer 2 min read

A collaboration between the U.S. federal government, IBM, Red Hat, and Intel shows how to automate security in containerized environments.

Greater efficiency. More adaptability. Limitless scalability. The benefits of modernizing an IT infrastructure and containerizing applications are well established, and all organizations like the sound of these results.

When it comes to regulated or sensitive workloads and data, however, organizations may resist the move to cloud in favor of on-premises security. This presents an important challenge for IT in all regulated industries—if you want to containerize sensitive data for a hybrid cloud or multicloud infrastructure, how can you verify that the containers run only on secure systems?

The National Institute of Standards and Technology (NIST) has an answer.

Modernized IT, with trust built in

A division of the U.S. Department of Commerce, NIST supports U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology. Essentially, it helps establish standards and best practices for U.S. industry.

As part of an ongoing collaboration, NIST, IBM, Red Hat, and Intel have defined a Trusted Container Platform for regulated applications and data. The platform provides an innovative solution, with policy-based governance, for automating processes to secure containerized workloads—so organizations handling such workloads can verify security and regulatory compliance.

NIST has posted the first in a series of blogs detailing the Trusted Container Platform. While the initial post provides an overview of the platform’s architecture, subsequent posts will delve into greater detail and provide steps for establishing the Trusted Container Platform.  

What is trust made of?

The Trusted Container Platform comprises three technologies, as outlined by NIST:

  • Intel Security Libraries for Data Center (Intel SecL – DC) is hardware root-of-trust technology to engage hardware-level security features and integrate them with cloud orchestration and services.
  • IBM Cloud Pak for Multicloud Management on Red Hat OpenShift orchestrates containerized workloads across platforms and clouds, with unified visibility into and control over security policy and governance.
  • Encrypted Container Images is a technology developed by IBM Research to allow encryption and decryption of containerized workloads, securing their content as they are ported between trusted systems.

Together, these technologies allow:

  • Organizations to encrypt their own container images, independent of MSPs or cloud vendors.
  • Decryption of container images only on secure, trusted systems.
  • Enforcement of these policies across managed clusters, on any cloud.

By building security from the hardware up and enabling centralized policy governance, the Trusted Container Platform is a viable way for organizations to gain the efficiencies of containerization while complying with security regulations.

Learn more

The full NIST blog, including a video demo of the Trusted Container Platform, can be viewed on the NIST website.

You can also check out a blog post from IBM Developer: “Policy-based governance in a trusted container platform.”

More from Announcements

Enabling customers to streamline document management with IBM watsonx.ai

2 min read - At Accusoft, our mission is to help organizations solve their most complex content workflow challenges by helping them adopt content processing, conversion and automation solutions. We accomplish this through our flagship product, PrizmDoc, which enables developers to enhance their applications with in-browser document viewing and collaboration functionality.  Over the past several years, we’ve been closely monitoring the evolving role of artificial intelligence (AI) in delivering cutting-edge solutions to our customers. Unlike many competitors who hastily incorporate AI  to check a…

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters