In some examples, non-transitory computer-readable storage stores machine-readable instructions that, when executed by a processor, cause the processor to identify an idle state of a computing device; evaluate a root of trust between a security chip and a container system to verify that the container system is a trusted container system; enable the trusted container system; receive a container during the idle state; and execute the container during the idle state using the trusted container system.