Confidential Containers: The Next Episode in Workload Isolation
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the latest advancements in workload isolation and confidential containers in this 31-minute conference talk by Jeremi Piotrowski from Microsoft. Delve into the evolution of container-based workload isolation, from OS-level separation to hardware-level boundaries with Kata Containers. Discover how new CPU capabilities enable enhanced confidentiality through Kata-CC, an extension of Kata Containers that leverages Trusted Execution Environment features. Learn about the combination of workload attestation and memory encryption to improve security in multi-tenant environments. Examine recent developments addressing hardware availability issues and making confidential computing more accessible. Gain insights into deploying containers in SEV-SNP (secure encrypted virtualization - secure nested paging) protected confidential virtual machines, and understand their respective architectures. Explore the challenges of hardware attestation and its role in ensuring workload portability.
Syllabus
The Next Episode in Workload Isolation: Confidential Containers - Jeremi Piotrowski, Microsoft
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
A Kernel in a Container? Understanding Kata ContainersDevConf via YouTube Beyond the Cluster: Harnessing the Power of Kubernetes Namespaces
CNCF [Cloud Native Computing Foundation] via YouTube Build Serverless with Kubernetes, Kata Containers and Bare Metal Cloud - Alibaba's Approach
Linux Foundation via YouTube CNCF Live Webinar - Kata and Arm, a Secure Alternative in the 5G Space
CNCF [Cloud Native Computing Foundation] via YouTube Confidential Containers for GPU Compute - Incorporating LLMs in AI Lift-and-Shift Strategy
CNCF [Cloud Native Computing Foundation] via YouTube