Zero Trust Architecture for Containers with Kata and Confidential Computing
OpenInfra Foundation via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 32-minute technical talk that delves into implementing zero trust architecture using Kata containers and confidential computing technologies. Discover how Kata containers provide fundamental isolation and sandboxing capabilities, while confidential containers enhance security features to meet stringent zero trust requirements. Learn about protecting sensitive data workloads from infrastructure hosts and Kubernetes control planes through Azure confidential computing (ACC), enabling remotely attestable and integrity-protected pods. Gain insights from speakers Amar Gowda and Michael Withrow as they examine Kata Containers and Kata Confidential Containers support with AKS, along with the latest community innovations in this domain. Access additional resources through aka.ms/cocoaks to further understand the integration of these security technologies.
Syllabus
Zero trust architecture for containers with Kata and Confidential Computing
Taught by
OpenInfra Foundation