YoVDO

Arm Confidential Compute Architecture: Open Source Enablement and Implementation

Offered By: Confidential Computing Consortium via YouTube

Tags

Confidential Computing Courses Linux Courses Open Source Courses KVM Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the latest developments in open-source project enablement for Arm Confidential Compute Architecture (Arm CCA) in this 58-minute conference talk. Delve into the reference security architecture and open-source implementation of hypervisor-based confidential computing built on top of the Armv9-A Realm Management Extension (RME). Learn about the current status and future steps for key components including Trusted Firmware, Linux, KVM, and EDK2. Discover the Arm CCA support in virtual platforms, Runtime Security Subsystem (RSS), generic Arm CCA bootflow, and RMM Specification Roadmap. Gain insights into Arm CCA Device Assignment, Confidential Containers (CoCo) on Arm CCA, and access valuable resources for Arm reference integration stacks.

Syllabus

Intro
Introducing Arm CCA
OSS enablement - Upstream components
Arm CCA support in virtual platforms
Runtime Security Subsystem (RSS)
RSS Boot and Runtime
Generic Arm CCA bootflow
RMM Specification Roadmap
Arm CCA Device Assignment
Other RMM specification backlog items
Confidential Containers (CoCo) on Arm CCA
Resources
Arm reference integration stacks


Taught by

Confidential Computing Consortium

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube