Главная
Study mode:
on
1
Introduction
2
Existing Trust Computing Base
3
What is Trust No One
4
How do we get there
5
Protecting data
6
Verifying software stack
7
Hardware dependencies
8
Software dependencies
9
Blockers
10
Solutions
11
KATA Containers
12
Service Offload
13
Walkthrough
14
What does this mean for the user
15
Gaps
16
Summary
Description:
Explore confidential computing for containers in this 27-minute conference talk from KubeCon + CloudNativeCon North America 2021. Delve into the challenges of protecting container data and code in multi-tenant cloud environments. Learn about Trusted Execution Environments (TEEs) and their role in safeguarding cloud assets at rest, in transit, and during use. Discover how emerging hardware technologies enable tenants to maintain exclusive trust. Examine cloud native gaps in supporting confidential computing, including memory encryption, authenticated launch, and application attestability. Understand how secure container runtimes like Kata can address these challenges. Gain insights into a proposed software architecture for implementing confidential computing in cloud native workloads. Cover topics such as the existing trust computing base, data protection methods, software stack verification, hardware and software dependencies, and potential blockers. Explore solutions like KATA Containers and service offload, and understand their implications for users. Conclude with a summary of the current gaps and future directions in confidential computing for containers. Read more

Trust No One - Bringing Confidential Computing to Containers

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00