YoVDO

When Confidential Containers Meet Arm Confidential Computing Architecture

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Kubernetes Courses Container Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intersection of Confidential Containers (CoCo) and Arm Confidential Compute Architecture (CCA) in this 32-minute conference talk. Learn about the CoCo project's goal to standardize confidential computing at the container level for Platform-as-a-Service (PaaS) and simplify its implementation in Kubernetes. Discover how Trusted Execution Environments (TEEs) are leveraged to protect containers and data, with contributions from major tech companies like Arm, Alibaba, AMD, IBM, Intel, Red Hat, and Microsoft. Gain insights into Arm China's specific contributions to the CoCo project, including the integration of CoCo in the Arm Fixed Virtual Platform (FVP) and attestation processes.

Syllabus

When Confidential Containers Meet Arm CCA - Jia He, Arm China


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube