YoVDO

Unlocking the Cloud with Confidential Computing

Offered By: All Things Open via YouTube

Tags

Confidential Computing Courses Cloud Security Courses Trusted Execution Environment Courses AMD SEV-SNP Courses Intel TDX Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the transformative potential of Confidential Computing in cloud technology through this informative conference talk presented at All Things Open 2022. Delve into the core concepts of Confidential Computing, including process-based and VM-based Trusted Execution Environments (TEEs), and understand the critical role of attestation in securing sensitive data and code. Examine various existing and upcoming CPU and GPU technologies supporting Confidential Computing, such as Intel's SGX2 and TDX, AMD's SEV-SNP, IBM's PEF, Arm's Realms, RISC-V's Sanctum, and NVIDIA's A100. Learn how Enarx, an open-source project under the Linux Foundation, demonstrates the practical applications of Confidential Computing. Discover real-world case studies highlighting the importance of enhanced security measures in sectors like healthcare and finance. Gain insights into modern deployment strategies, isolation types, and the significance of WebAssembly in cloud security. Understand how Confidential Computing is revolutionizing cloud accessibility for organizations with stringent data protection requirements, ultimately unlocking the full potential of cloud computing across various industries.

Syllabus

Intro
2022 Case Study: Red Cross
2022 Case Study: Cash App
2022 Case Study: LAPSUS$ Attacks
Is unauthorized the correct terminology? No.
Legacy Deployments
Modern Deployments
Blaming the User
Isolation Types
Confidential Computing Consortium...
Attestation Requires
Confidential Computing Technologies
Enarx aims to solve security-at-scale
Keep Architecture
The Importance of WebAssembly
Enarx Services
The Enarx Project
Profian is a Next-Generation Cloud Security Star


Taught by

All Things Open

Related Courses

Improving Bootup Performance of Containers with Overlay Images in TEE Environments
Linux Foundation via YouTube
Unifying Confidential Attestation - Strategies and Approaches
Linux Foundation via YouTube
Protected KVM on Arm64: A Technical Deep Dive
Linux Foundation via YouTube
No More Turtles: The SecondaryVM Framework - An Alternative to Nested Virtualization
Linux Foundation via YouTube
The Five Big Problems with Confidential Containers
Linux Foundation via YouTube