Securing Edge Systems with TPM 2.0 and SPIRE
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore how TPM 2.0 and SPIRE can be utilized to architect secure edge and hybrid systems in this informative conference talk. Delve into the capabilities of the TPM 2.0 device, a secure enclave found in most recent servers, workstations, and laptops. Learn about different types of TPMs, including virtualized options, and understand key concepts such as selectors, trust, and TPM verification. Gain insights into the threat model for CI systems and TPM policy implementation. Watch a practical demonstration showcasing the integration of TPM and SPIRE technologies. Discover future developments in this field and participate in a Q&A session to deepen your understanding of securing edge systems.
Syllabus
Intro
Coles background
TestifySec
Threat Model CI Systems
TPM Policy
SPIRE
TPM
Demo Overview
What is a TPM
Types of TPMs
Virtualized TPMs
Selectors
Trust
TPM Verification
Demo
Future Work
QA
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube