August 5, 2020 By Rob Spencer 2 min read

A collaboration between the U.S. federal government, IBM, Red Hat, and Intel shows how to automate security in containerized environments.

Greater efficiency. More adaptability. Limitless scalability. The benefits of modernizing an IT infrastructure and containerizing applications are well established, and all organizations like the sound of these results.

When it comes to regulated or sensitive workloads and data, however, organizations may resist the move to cloud in favor of on-premises security. This presents an important challenge for IT in all regulated industries—if you want to containerize sensitive data for a hybrid cloud or multicloud infrastructure, how can you verify that the containers run only on secure systems?

The National Institute of Standards and Technology (NIST) has an answer.

Modernized IT, with trust built in

A division of the U.S. Department of Commerce, NIST supports U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology. Essentially, it helps establish standards and best practices for U.S. industry.

As part of an ongoing collaboration, NIST, IBM, Red Hat, and Intel have defined a Trusted Container Platform for regulated applications and data. The platform provides an innovative solution, with policy-based governance, for automating processes to secure containerized workloads—so organizations handling such workloads can verify security and regulatory compliance.

NIST has posted the first in a series of blogs detailing the Trusted Container Platform. While the initial post provides an overview of the platform’s architecture, subsequent posts will delve into greater detail and provide steps for establishing the Trusted Container Platform.  

What is trust made of?

The Trusted Container Platform comprises three technologies, as outlined by NIST:

  • Intel Security Libraries for Data Center (Intel SecL – DC) is hardware root-of-trust technology to engage hardware-level security features and integrate them with cloud orchestration and services.
  • IBM Cloud Pak for Multicloud Management on Red Hat OpenShift orchestrates containerized workloads across platforms and clouds, with unified visibility into and control over security policy and governance.
  • Encrypted Container Images is a technology developed by IBM Research to allow encryption and decryption of containerized workloads, securing their content as they are ported between trusted systems.

Together, these technologies allow:

  • Organizations to encrypt their own container images, independent of MSPs or cloud vendors.
  • Decryption of container images only on secure, trusted systems.
  • Enforcement of these policies across managed clusters, on any cloud.

By building security from the hardware up and enabling centralized policy governance, the Trusted Container Platform is a viable way for organizations to gain the efficiencies of containerization while complying with security regulations.

Learn more

The full NIST blog, including a video demo of the Trusted Container Platform, can be viewed on the NIST website.

You can also check out a blog post from IBM Developer: “Policy-based governance in a trusted container platform.”

More from Announcements

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

Unify and share data across Netezza and watsonx.data for new generative AI applications

3 min read - In today's data and AI-driven world, organizations are generating vast amounts of data from various sources. The ability to extract value from AI initiatives relies heavily on the availability and quality of an enterprise's underlying data. In order to unlock the full potential of data for AI, organizations must be able to effectively navigate their complex IT landscapes across the hybrid cloud.   At this year’s IBM Think conference in Boston, we announced the new capabilities of IBM watsonx.data, an open…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters