Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Chains of Trust in Confidential Computing

KVM Forum via YouTube

Overview

Explore the various chains of trust required to preserve confidentiality in Confidential Computing implementations during this 33-minute KVM Forum talk. Delve into the use cases for Confidential Virtual Machines, Containers, and Clusters, examining the root of trust, proof mechanisms, verification processes, and outcomes of successful verification for each scenario. Discover techniques and technologies such as local and remote attestation, firmware-based certification, virtual TPM implementations, and attested TLS. Gain insights into the different requirements for attesting execution environments, workloads, users, and nodes joining clusters in the context of Confidential Computing.

Syllabus

Chains of trust in Confidential Computing

Taught by

KVM Forum

Reviews

Start your review of Chains of Trust in Confidential Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.