YoVDO

Combining Confidential Computing and Cloud Native Security

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud Security Courses Kubernetes Courses Data Center Security Courses Confidential Computing Courses eBPF Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to safeguard your infrastructure against both external and internal threats in this 33-minute CNCF conference talk. Learn to combine cloud-native security practices with confidential computing to protect and attest the integrity of a Kubernetes cluster. Discover the process of setting up the Constellation Kubernetes distribution on a public cloud provider, configuring signature validation for images, and implementing Tetragon for eBPF-based runtime enforcement. Gain valuable insights into protecting services even when the data center running in the cloud has been compromised.

Syllabus

Combining Confidential Computing and Cloud Native Security by Moritz Eckert and Saul O'Driscoll


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

100Gbit/s Clusters with Cilium - Building Tomorrow's Networking Data Plane
CNCF [Cloud Native Computing Foundation] via YouTube
Optimizing Service Mesh for Performance and High Availability
CNCF [Cloud Native Computing Foundation] via YouTube
Kernel Tracing With EBPF
media.ccc.de via YouTube
A Guided Tour of Cilium Service Mesh
CNCF [Cloud Native Computing Foundation] via YouTube
A High-Schooler's Guide to Kubernetes Network Observability
CNCF [Cloud Native Computing Foundation] via YouTube