Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

A Secure Tekton Task by Using Confidential Containers

Linux Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to protect Tekton tasks from software supply chain attacks using Confidential Containers technology in this 18-minute conference talk. Explore the emerging threat of software supply chain attacks where attackers gain internal network access through social engineering, escalate to administrator privileges, and inject backdoors into built artifacts to steal confidential information or digital assets. Discover how Confidential Containers, an open source project, addresses the critical attack surface of software supply chain administrators by leveraging trusted execution environments (TEEs) to protect containers from administrators themselves. Understand the implementation of Confidential Containers to safeguard Kubernetes pods from cluster administrators by running pods inside TEEs and validating them through remote attestation. Examine a practical use case demonstrating how Confidential Containers can secure Tekton tasks and artifacts even when cluster administrators are compromised, providing essential protection for enterprise software supply chains.

Syllabus

A Secure Tekton Task by Using Confidential Containers - Tatsushi Inagaki, IBM

Taught by

Linux Foundation

Reviews

Start your review of A Secure Tekton Task by Using Confidential Containers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.