YoVDO

The Rise of Confidential Computing

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Data Protection Courses Cloud Security Courses Trusted Execution Environment Courses Confidential Computing Courses

Course Description

Overview

Explore the emerging field of confidential computing in this 49-minute RSA Conference talk by Mark Russinovich, Chief Technology Officer of Microsoft Azure. Delve into Trusted Execution Environments (TEEs) and their role in implementing secure data processing within untrusted or compromised systems. Learn about architectures, runtimes, compilers, and tools for creating confidential computing services using TEEs. Discover how TEEs protect encrypted code and data from malicious actors in public cloud environments. Examine topics such as cloud data threats, data protection methods, Hyper-V Virtualization Based Security, and comparisons between TEEs and other secure hardware. Explore common TEE application patterns, confidential cloud concepts, and Azure's approach to confidential computing. Gain insights into the ACC development environment, universal cloud attestation, and techniques for preventing indirect information leaks. Investigate practical applications like Confidential SQL Always Encrypted and the Coco Framework architecture for smart contract access control.

Syllabus

Intro
Cloud Data Threats
Data Protection
Trusted Execution Environments (TEES)
TEE application architecture
Hyper-V Virtualization Based Security (VBS)
TEEs compared to other secure hardware
Common TEE application patterns
Confidential cloud
Azure and confidential computing
The ACC development environment
Universal cloud attestation
Preventing indirect information leaks
Confidential SQL Always Encrypted
Coco Framework architecture
Smart contract access control (cont)
Summary
References


Taught by

RSA Conference

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
vSGX: Virtualizing SGX Enclaves on AMD SEV
IEEE via YouTube