YoVDO

The Five Big Problems with Confidential Containers

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Containers Courses Access Control Courses KVM Courses AMD SEV Courses Intel TDX Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the five major technical and commercial challenges facing confidential containers in this conference talk. Delve into attestation of workloads, performance issues, image download optimizations, access control considerations, and debuggability concerns. Learn about existing solutions, ongoing developments, and potential strategies to mitigate these challenges. Gain insights into how hypervisors and KVM are involved in addressing these problems, and understand the current state of confidential computing technologies like Intel's TDX and AMD's SEV.

Syllabus

Introduction
What is Confidential Computing
Confidential Containers overview
attestation
image download
Access control
Debugability
Conclusion
Questions


Taught by

Linux Foundation

Tags

Related Courses

Linux High Availability Clustering on RHEL 8 (2023)
Udemy
CentOS Enterprise Linux 7 Virtualization Management
Pluralsight
OpenStack Installation and Deployment
Udemy
Linux Foundation Cert Prep: Virtualization (Ubuntu)
LinkedIn Learning
Linux System Engineer: Network Bonding, IPv6, Routing, and Virtual Systems
LinkedIn Learning