YoVDO

Enabling Hardware Security Modules for Confidential Computing - Lecture

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cryptography Courses Network Security Courses Cloud Security Courses Virtual Machines Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the integration of Hardware Security Modules (HSMs) with Confidential Computing in this 50-minute conference talk by Reinhard Buendgen from IBM. Delve into the security challenges faced by confidential computing workloads and learn how HSMs can enhance protection for cryptographic keys. Examine the potential attack vectors that arise when using HSMs in cloud environments and discover strategies to establish trustworthy relationships between virtual machines in trusted execution environments, HSMs, and cryptographic keys. Gain insights into the security promises of both confidential computing and HSMs, and understand the methods to overcome challenges associated with HSM usage in the cloud. Finally, learn how IBM Secure Execution for Linux enables secure access to Crypto Express HSMs for Linux KVM guests, providing a comprehensive solution for enhanced security in confidential computing environments.

Syllabus

Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM


Taught by

Linux Foundation

Tags

Related Courses

Emerging Technologies Capstone
Yonsei University via Coursera
Microsoft Azure Virtual Machines
Microsoft via edX
Introduction to Microsoft Azure
Microsoft via edX
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course)
Hebrew University of Jerusalem via Coursera