Skip to main content
Version: 0.6


Welcome to the documentation of Contrast! Contrast runs confidential container deployments on Kubernetes at scale.

Contrast is based on the Kata Containers and Confidential Containers projects. Confidential Containers are Kubernetes pods that are executed inside a confidential micro-VM and provide strong hardware-based isolation from the surrounding environment. This works with unmodified containers in a lift-and-shift approach. Contrast currently targets the CoCo preview on AKS.


See the 📄whitepaper for more information on confidential computing.


Contrast is designed to keep all data always encrypted and to prevent access from the infrastructure layer. It removes the infrastructure provider from the trusted computing base (TCB). This includes access from datacenter employees, privileged cloud admins, own cluster administrators, and attackers coming through the infrastructure, for example, malicious co-tenants escalating their privileges.

Contrast integrates fluently with the existing Kubernetes workflows. It's compatible with managed Kubernetes, can be installed as a day-2 operation and imposes only minimal changes to your deployment flow.

Use Cases

Contrast provides unique security features and benefits. The core use cases are:

  • Increasing the security of your containers
  • Moving sensitive workloads from on-prem to the cloud with Confidential Computing
  • Shielding the code and data even from the own cluster administrators
  • Increasing the trustworthiness of your SaaS offerings
  • Simplifying regulatory compliance
  • Multi-party computation for data collaboration

Next steps

You can learn more about the concept of Confidential Containers, features, and security benefits of Contrast in this section. To jump right into the action head to Getting started.