YoVDO

Unlocking the Cloud with Confidential Computing

Offered By: All Things Open via YouTube

Tags

Confidential Computing Courses Cloud Security Courses Trusted Execution Environment Courses AMD SEV-SNP Courses Intel TDX Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the transformative potential of Confidential Computing in cloud technology through this informative conference talk presented at All Things Open 2022. Delve into the core concepts of Confidential Computing, including process-based and VM-based Trusted Execution Environments (TEEs), and understand the critical role of attestation in securing sensitive data and code. Examine various existing and upcoming CPU and GPU technologies supporting Confidential Computing, such as Intel's SGX2 and TDX, AMD's SEV-SNP, IBM's PEF, Arm's Realms, RISC-V's Sanctum, and NVIDIA's A100. Learn how Enarx, an open-source project under the Linux Foundation, demonstrates the practical applications of Confidential Computing. Discover real-world case studies highlighting the importance of enhanced security measures in sectors like healthcare and finance. Gain insights into modern deployment strategies, isolation types, and the significance of WebAssembly in cloud security. Understand how Confidential Computing is revolutionizing cloud accessibility for organizations with stringent data protection requirements, ultimately unlocking the full potential of cloud computing across various industries.

Syllabus

Intro
2022 Case Study: Red Cross
2022 Case Study: Cash App
2022 Case Study: LAPSUS$ Attacks
Is unauthorized the correct terminology? No.
Legacy Deployments
Modern Deployments
Blaming the User
Isolation Types
Confidential Computing Consortium...
Attestation Requires
Confidential Computing Technologies
Enarx aims to solve security-at-scale
Keep Architecture
The Importance of WebAssembly
Enarx Services
The Enarx Project
Profian is a Next-Generation Cloud Security Star


Taught by

All Things Open

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube