YoVDO

The Rise of Confidential Computing

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Data Protection Courses Cloud Security Courses Trusted Execution Environment Courses Confidential Computing Courses

Course Description

Overview

Explore the emerging field of confidential computing in this 49-minute RSA Conference talk by Mark Russinovich, Chief Technology Officer of Microsoft Azure. Delve into Trusted Execution Environments (TEEs) and their role in implementing secure data processing within untrusted or compromised systems. Learn about architectures, runtimes, compilers, and tools for creating confidential computing services using TEEs. Discover how TEEs protect encrypted code and data from malicious actors in public cloud environments. Examine topics such as cloud data threats, data protection methods, Hyper-V Virtualization Based Security, and comparisons between TEEs and other secure hardware. Explore common TEE application patterns, confidential cloud concepts, and Azure's approach to confidential computing. Gain insights into the ACC development environment, universal cloud attestation, and techniques for preventing indirect information leaks. Investigate practical applications like Confidential SQL Always Encrypted and the Coco Framework architecture for smart contract access control.

Syllabus

Intro
Cloud Data Threats
Data Protection
Trusted Execution Environments (TEES)
TEE application architecture
Hyper-V Virtualization Based Security (VBS)
TEEs compared to other secure hardware
Common TEE application patterns
Confidential cloud
Azure and confidential computing
The ACC development environment
Universal cloud attestation
Preventing indirect information leaks
Confidential SQL Always Encrypted
Coco Framework architecture
Smart contract access control (cont)
Summary
References


Taught by

RSA Conference

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube
Securing Linux VM Boot with AMD SEV Measurement
Linux Foundation via YouTube