Chains of Trust in Confidential Computing
Offered By: KVM Forum via YouTube
Course Description
Overview
Explore the various chains of trust required to preserve confidentiality in Confidential Computing implementations during this 33-minute KVM Forum talk. Delve into the use cases for Confidential Virtual Machines, Containers, and Clusters, examining the root of trust, proof mechanisms, verification processes, and outcomes of successful verification for each scenario. Discover techniques and technologies such as local and remote attestation, firmware-based certification, virtual TPM implementations, and attested TLS. Gain insights into the different requirements for attesting execution environments, workloads, users, and nodes joining clusters in the context of Confidential Computing.
Syllabus
Chains of trust in Confidential Computing
Taught by
KVM Forum
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube