Combining Confidential Computing and Cloud Native Security
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore how to safeguard your infrastructure against both external and internal threats in this 33-minute CNCF conference talk. Learn to combine cloud-native security practices with confidential computing to protect and attest the integrity of a Kubernetes cluster. Discover the process of setting up the Constellation Kubernetes distribution on a public cloud provider, configuring signature validation for images, and implementing Tetragon for eBPF-based runtime enforcement. Gain valuable insights into protecting services even when the data center running in the cloud has been compromised.
Syllabus
Combining Confidential Computing and Cloud Native Security by Moritz Eckert and Saul O'Driscoll
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube