Главная
Study mode:
on
1
Introduction
2
What is a TEE
3
Who is a TEE for
4
Use Cases
5
TEE chip implementations
6
How to establish trust
7
TEE attestation
8
TEE data
9
How to use TEE
10
casa de papel
11
features
12
attack tree
13
trust
14
silver bullet
15
where does Kubernetes fit
16
operating Kubernetes
17
Open Enclave
18
Unikernel
19
RunE
20
MarbleRun
21
Arcs
22
Overview
23
Formal Verification
24
Compliance
25
Government Agencies
26
Whats Next
27
What About the Supply Chain
Description:
Explore the world of Trusted Execution Environments (TEEs) in Kubernetes for critical infrastructure security in this 36-minute conference talk. Dive into the fundamentals of TEEs, their implementations across various chip platforms, and their significance in creating a Trusted Computing Base (TCB) for Kubernetes deployments. Learn how to leverage TEE enclaves to protect the Kubernetes control plane, data flows, and CI/CD pipelines, effectively reducing attack surfaces and mitigating third-party supply chain risks. Examine detailed Kubernetes threat models, discover techniques for attacking and defending Kubernetes workloads within TEE contexts, and gain insights into protecting container image integrity. Explore the development and operational challenges associated with TEE usage, and understand the compliance benefits, including specific policy and control mappings for GDPR, CCPA, PCI, HIPAA, and NIST 800-53. Gain valuable knowledge on topics such as TEE attestation, establishing trust, and the role of Kubernetes in TEE implementations, as well as emerging technologies like Open Enclave, Unikernel, and RunE. Read more

Attacking and Defending Kubernetes TEE Enclaves in Critical Infrastructure

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00