YoVDO

When Confidential Containers Meet Arm Confidential Computing Architecture

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Kubernetes Courses Container Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intersection of Confidential Containers (CoCo) and Arm Confidential Compute Architecture (CCA) in this 32-minute conference talk. Learn about the CoCo project's goal to standardize confidential computing at the container level for Platform-as-a-Service (PaaS) and simplify its implementation in Kubernetes. Discover how Trusted Execution Environments (TEEs) are leveraged to protect containers and data, with contributions from major tech companies like Arm, Alibaba, AMD, IBM, Intel, Red Hat, and Microsoft. Gain insights into Arm China's specific contributions to the CoCo project, including the integration of CoCo in the Arm Fixed Virtual Platform (FVP) and attestation processes.

Syllabus

When Confidential Containers Meet Arm CCA - Jia He, Arm China


Taught by

Linux Foundation

Tags

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube