How Anjuna and Confidential Containers Can Help Deliver America's Cyber Priorities

Mark Bower
Chief Strategy Officer, Anjuna
Published on
May 6, 2026
The White House's cybersecurity strategy sets ambitious goals. Confidential containers are one of the few technologies that can meet them at the workload execution layer — where the hardest defense problems now live.
https://www.anjuna.io/blog/anjuna-confidential-containers-white-house-cyber-priorities

The White House's most recent cybersecurity strategy calls for faster action against adversaries, stronger public-private coordination, streamlined regulation, modernization of federal systems, protection of critical infrastructure, and a secure AI technology stack that includes agentic AI. It emphasizes zero-trust architecture, post-quantum cryptography, supply chain security, rapid recovery, and privacy from design to deployment.

For defense cybersecurity leadership, the question is not whether these goals are sound. It is how to operationalize them at the speed of innovation. That is where Anjuna comes in.

What Confidential Containers Actually Do

Anjuna's technology runs containerized workloads inside hardware-based Trusted Execution Environments (TEEs), so that code, data, and runtime state remain protected while in use — not just at rest or in transit. In practice, confidential containers isolate sensitive workloads from compromised hosts, overly privileged administrators, and much of the infrastructure layer that has traditionally been part of the attack surface.

Anjuna extends this foundation with enterprise control, attestation-driven trust, policy enforcement, and operational deployment models suited to real-world regulated environments. The result is a practical bridge between the White House cybersecurity strategy and deployable capability.

Five Ways Anjuna Responds to the Strategy's Calls to Action

1. Making Zero Trust Real for Modern Workloads

Zero trust requires trust decisions to be made on verified evidence, not assumed identity. Confidential containers bring true hardware trust anchors to zero trust — requiring verified workload measurements, approved policies, and attested runtime state before secrets, models, or mission data are released. This is zero trust at the compute layer, not just the network layer.

2. Securing AI and Agentic Systems

The strategy specifically calls for a secure AI technology stack, including agentic AI. Confidential containers protect:

  • Model weights and architecture — core IP, protected during inference
  • Sensitive prompts and inputs — including PII, PHI, and mission-sensitive context
  • Agent-to-tool interactions — the execution boundaries between AI agents and the systems they operate
  • Data retrieval and RAG context — the knowledge bases that define AI behavior

Anjuna adds policy-based controls and attestation-driven assurance that the right code is running in the right environment before access is granted — directly addressing runtime exposure, which is where AI risk most often lives.

3. Modernizing Infrastructure Without Expanding the Attack Surface

Modern modernization introduces more technology layers, more operators, and more third parties. Confidential containers secure the application and AI agent while reducing how much of the underlying environment must be trusted. This is especially relevant for multi-tenant programs, coalitions, and sensitive workloads that must run on shared infrastructure without exposing data or algorithms.

4. Strengthening Critical Infrastructure and Supply Chain Resilience

Anjuna limits the value of compromise — protecting sensitive services even when the surrounding environment is under strain, and enabling stronger provenance and policy checks before workloads operate. For defense-critical infrastructure, that means a more resilient footing for command applications, data fusion services, secure analytics, and AI-enabled decision support.

5. Reducing Compliance Burden While Protecting Privacy

A hardware-backed confidential computing model reduces control sprawl, blast radius, and security vulnerabilities. It can demonstrate that sensitive data, mission logic, and AI assets are isolated and accessed only by verified workloads under approved policy — the kind of evidence that satisfies auditors and regulators, and that no access control list alone can replicate.

The Broader Point

Strategy alone does not secure workloads — operating models do. Defense cybersecurity leaders need confidential computing that can be applied to containerized applications, AI services, and sensitive data workflows without forcing complete rewrites or fragile one-off integrations. They need a way to enforce who or what can access secrets, models, APIs, and data based on attested evidence.

Anjuna's confidential containers are one of the few technologies that directly improve security at the workload execution layer, where some of the hardest defense problems now live. When combined with Anjuna's control plane, attestation, and policy enforcement approach, they offer defense cybersecurity leadership a credible way to reduce trust assumptions, protect sensitive workloads in use, and modernize without surrendering control.

Ready to see how Anjuna works? Contact us for a demo.

More like this
Get Started Free with Anjuna Seaglass

Try free for 30 days on AWS, Azure or Google Cloud, and experience the power of intrinsic cloud security.

Start Free