YoVDO

Combining Confidential Computing and Cloud Native Security

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud Security Courses Kubernetes Courses Data Center Security Courses Confidential Computing Courses eBPF Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to safeguard your infrastructure against both external and internal threats in this 33-minute CNCF conference talk. Learn to combine cloud-native security practices with confidential computing to protect and attest the integrity of a Kubernetes cluster. Discover the process of setting up the Constellation Kubernetes distribution on a public cloud provider, configuring signature validation for images, and implementing Tetragon for eBPF-based runtime enforcement. Gain valuable insights into protecting services even when the data center running in the cloud has been compromised.

Syllabus

Combining Confidential Computing and Cloud Native Security by Moritz Eckert and Saul O'Driscoll


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Tetragon: A Kubernetes Observability and Security Tool
Linux Foundation via YouTube
Introduction to Tetragon - CNCF Security Tool
CNCF [Cloud Native Computing Foundation] via YouTube
eBPF for Observability: The Good, the Bad, and the Ugly
CNCF [Cloud Native Computing Foundation] via YouTube
Securing the Superpowers: Who Loaded That eBPF Program?
CNCF [Cloud Native Computing Foundation] via YouTube
Securing CI/CD Systems Through eBPF
CNCF [Cloud Native Computing Foundation] via YouTube