Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Trust No One - Bringing Confidential Computing to Containers

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore confidential computing for containers in this 27-minute conference talk from KubeCon + CloudNativeCon North America 2021. Delve into the challenges of protecting container data and code in multi-tenant cloud environments. Learn about Trusted Execution Environments (TEEs) and their role in safeguarding cloud assets at rest, in transit, and during use. Discover how emerging hardware technologies enable tenants to maintain exclusive trust. Examine cloud native gaps in supporting confidential computing, including memory encryption, authenticated launch, and application attestability. Understand how secure container runtimes like Kata can address these challenges. Gain insights into a proposed software architecture for implementing confidential computing in cloud native workloads. Cover topics such as the existing trust computing base, data protection methods, software stack verification, hardware and software dependencies, and potential blockers. Explore solutions like KATA Containers and service offload, and understand their implications for users. Conclude with a summary of the current gaps and future directions in confidential computing for containers.

Syllabus

Introduction
Existing Trust Computing Base
What is Trust No One
How do we get there
Protecting data
Verifying software stack
Hardware dependencies
Software dependencies
Blockers
Solutions
KATA Containers
Service Offload
Walkthrough
What does this mean for the user
Gaps
Summary

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Trust No One - Bringing Confidential Computing to Containers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.