Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing Edge Systems with TPM 2.0 and SPIRE

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore how TPM 2.0 and SPIRE can be utilized to architect secure edge and hybrid systems in this informative conference talk. Delve into the capabilities of the TPM 2.0 device, a secure enclave found in most recent servers, workstations, and laptops. Learn about different types of TPMs, including virtualized options, and understand key concepts such as selectors, trust, and TPM verification. Gain insights into the threat model for CI systems and TPM policy implementation. Watch a practical demonstration showcasing the integration of TPM and SPIRE technologies. Discover future developments in this field and participate in a Q&A session to deepen your understanding of securing edge systems.

Syllabus

Intro
Coles background
TestifySec
Threat Model CI Systems
TPM Policy
SPIRE
TPM
Demo Overview
What is a TPM
Types of TPMs
Virtualized TPMs
Selectors
Trust
TPM Verification
Demo
Future Work
QA

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Securing Edge Systems with TPM 2.0 and SPIRE

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.