Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
NY State-Licensed Certificates in Design, Coding & AI — Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to protect Tekton tasks from software supply chain attacks using Confidential Containers technology in this 18-minute conference talk. Explore the emerging threat of software supply chain attacks where attackers gain internal network access through social engineering, escalate to administrator privileges, and inject backdoors into built artifacts to steal confidential information or digital assets. Discover how Confidential Containers, an open source project, addresses the critical attack surface of software supply chain administrators by leveraging trusted execution environments (TEEs) to protect containers from administrators themselves. Understand the implementation of Confidential Containers to safeguard Kubernetes pods from cluster administrators by running pods inside TEEs and validating them through remote attestation. Examine a practical use case demonstrating how Confidential Containers can secure Tekton tasks and artifacts even when cluster administrators are compromised, providing essential protection for enterprise software supply chains.
Syllabus
A Secure Tekton Task by Using Confidential Containers - Tatsushi Inagaki, IBM
Taught by
Linux Foundation