YoVDO

Combining Confidential Computing and Cloud Native Security

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud Security Courses Kubernetes Courses Data Center Security Courses Confidential Computing Courses eBPF Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to safeguard your infrastructure against both external and internal threats in this 33-minute CNCF conference talk. Learn to combine cloud-native security practices with confidential computing to protect and attest the integrity of a Kubernetes cluster. Discover the process of setting up the Constellation Kubernetes distribution on a public cloud provider, configuring signature validation for images, and implementing Tetragon for eBPF-based runtime enforcement. Gain valuable insights into protecting services even when the data center running in the cloud has been compromised.

Syllabus

Combining Confidential Computing and Cloud Native Security by Moritz Eckert and Saul O'Driscoll


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube