Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Zero Trust Architecture for Containers with Kata and Confidential Computing

OpenInfra Foundation via YouTube

Overview

Explore a 32-minute technical talk that delves into implementing zero trust architecture using Kata containers and confidential computing technologies. Discover how Kata containers provide fundamental isolation and sandboxing capabilities, while confidential containers enhance security features to meet stringent zero trust requirements. Learn about protecting sensitive data workloads from infrastructure hosts and Kubernetes control planes through Azure confidential computing (ACC), enabling remotely attestable and integrity-protected pods. Gain insights from speakers Amar Gowda and Michael Withrow as they examine Kata Containers and Kata Confidential Containers support with AKS, along with the latest community innovations in this domain. Access additional resources through aka.ms/cocoaks to further understand the integration of these security technologies.

Syllabus

Zero trust architecture for containers with Kata and Confidential Computing

Taught by

OpenInfra Foundation

Reviews

Start your review of Zero Trust Architecture for Containers with Kata and Confidential Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.