Overview
Explore the five major technical and commercial challenges facing confidential containers in this conference talk. Delve into attestation of workloads, performance issues, image download optimizations, access control considerations, and debuggability concerns. Learn about existing solutions, ongoing developments, and potential strategies to mitigate these challenges. Gain insights into how hypervisors and KVM are involved in addressing these problems, and understand the current state of confidential computing technologies like Intel's TDX and AMD's SEV.
Syllabus
Introduction
What is Confidential Computing
Confidential Containers overview
attestation
image download
Access control
Debugability
Conclusion
Questions
Taught by
Linux Foundation