Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    CoreOS Brings Distributed Trusted Computing to Containers

    By
    Sean Michael Kerner
    -
    December 2, 2015
    Share
    Facebook
    Twitter
    Linkedin

      NEW YORK–Few areas of technologies are as hot today as that of containers and security. Today at the Tectonic Summit at the Times Center in New York City, CoreOS is announcing a new approach called Distributed Trusted Computing that deeply integrates security into containers at every layer of the technology stack, from bare metal on up.

      Tectonic is CoreOS’ commercial platform that includes the CoreOS Linux operating system the rkt (rocket) container technology and the Kubernetes container cluster management system. CoreOS first announced Tectonic in April of this year, alongside a $12 million round of funding.

      In kicking off its container conference with a security announcement, CoreOS is matching its container ecosystem rival Docker Inc., which used the Dockercon EU event in November to launch new security efforts as well.

      In a video interview with eWEEK at the Tectonic Summit, Alex Polvi, CEO of CoreOS, explained what Distributed Trusted Computing is all about and how it’s core to his vision for a new, secure paradigm for the Internet. What Trusted Computing ensures is that only specific signed and approved software can run on hardware, he said.

      “All server structure infrastructure software is running untrusted right now. You just kind of hope that what the server is running is what you expect it to be,” Polvi said.

      Distributed Trusted Computing relies on a number of core elements of technology, including Unified Extensible Firmware Interface (UEFI) Secure Boot and Trusted Platform Module (TPM) for security. Polvi explained that at each layer of the application stack, there is a security verification check. As such, the UEFI firmware validates the system bootloader; the bootloader in turn validates the operating system.

      The CoreOS Linux operating system itself comes up in a completely immutable state and then the rocket (rkt) container runtime carries the chain of trust into the container as well as registering the data into the TPM. Then the control plane for the distributed cluster uses the full attestation to understand if a server can be allowed to connect into the cluster.

      “We believe that this style of infrastructure unlocks the possibility to dramatically improve the security of the Internet overall,” Polvi said. “The combination of containers, distributed systems and now trusted computing we think represents a big change for server infrastructure.”

      Watch the full video interview with Alex Polvi below:

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Avatar
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×