Главная
Study mode:
on
1
Intro
2
Cloud Data Threats
3
Data Protection
4
Trusted Execution Environments (TEES)
5
TEE application architecture
6
Hyper-V Virtualization Based Security (VBS)
7
TEEs compared to other secure hardware
8
Common TEE application patterns
9
Confidential cloud
10
Azure and confidential computing
11
The ACC development environment
12
Universal cloud attestation
13
Preventing indirect information leaks
14
Confidential SQL Always Encrypted
15
Coco Framework architecture
16
Smart contract access control (cont)
17
Summary
18
References
Description:
Explore the emerging field of confidential computing in this 49-minute RSA Conference talk by Mark Russinovich, Chief Technology Officer of Microsoft Azure. Delve into Trusted Execution Environments (TEEs) and their role in implementing secure data processing within untrusted or compromised systems. Learn about architectures, runtimes, compilers, and tools for creating confidential computing services using TEEs. Discover how TEEs protect encrypted code and data from malicious actors in public cloud environments. Examine topics such as cloud data threats, data protection methods, Hyper-V Virtualization Based Security, and comparisons between TEEs and other secure hardware. Explore common TEE application patterns, confidential cloud concepts, and Azure's approach to confidential computing. Gain insights into the ACC development environment, universal cloud attestation, and techniques for preventing indirect information leaks. Investigate practical applications like Confidential SQL Always Encrypted and the Coco Framework architecture for smart contract access control. Read more

The Rise of Confidential Computing

RSA Conference
Add to list
0:00 / 0:00