Arm Confidential Compute Architecture: Open Source Enablement and Implementation
Offered By: Confidential Computing Consortium via YouTube
Course Description
Overview
Explore the latest developments in open-source project enablement for Arm Confidential Compute Architecture (Arm CCA) in this 58-minute conference talk. Delve into the reference security architecture and open-source implementation of hypervisor-based confidential computing built on top of the Armv9-A Realm Management Extension (RME). Learn about the current status and future steps for key components including Trusted Firmware, Linux, KVM, and EDK2. Discover the Arm CCA support in virtual platforms, Runtime Security Subsystem (RSS), generic Arm CCA bootflow, and RMM Specification Roadmap. Gain insights into Arm CCA Device Assignment, Confidential Containers (CoCo) on Arm CCA, and access valuable resources for Arm reference integration stacks.
Syllabus
Intro
Introducing Arm CCA
OSS enablement - Upstream components
Arm CCA support in virtual platforms
Runtime Security Subsystem (RSS)
RSS Boot and Runtime
Generic Arm CCA bootflow
RMM Specification Roadmap
Arm CCA Device Assignment
Other RMM specification backlog items
Confidential Containers (CoCo) on Arm CCA
Resources
Arm reference integration stacks
Taught by
Confidential Computing Consortium
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube