YoVDO

Chains of Trust in Confidential Computing

Offered By: KVM Forum via YouTube

Tags

Confidential Computing Courses Containers Courses Virtual Machines Courses Remote Attestation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the various chains of trust required to preserve confidentiality in Confidential Computing implementations during this 33-minute KVM Forum talk. Delve into the use cases for Confidential Virtual Machines, Containers, and Clusters, examining the root of trust, proof mechanisms, verification processes, and outcomes of successful verification for each scenario. Discover techniques and technologies such as local and remote attestation, firmware-based certification, virtual TPM implementations, and attested TLS. Gain insights into the different requirements for attesting execution environments, workloads, users, and nodes joining clusters in the context of Confidential Computing.

Syllabus

Chains of trust in Confidential Computing


Taught by

KVM Forum

Related Courses

A Simple Protocol for Remote Attestation of System Integrity
Linux Foundation via YouTube
A Trusted Trip in the Cloud - Working with Trusted Hardware
code::dive conference via YouTube
Beyond Memory Encryption: Accelerating Confidential Computing for Cloud Native
CNCF [Cloud Native Computing Foundation] via YouTube
Simple Remote Attestation with Secure and Attested Communication Channels
Linux Foundation via YouTube
Breaking Hardware-Enforced Security With Hypervisors
Black Hat via YouTube