Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this comprehensive webinar from the Confidential Computing Consortium. Explore the unique challenges of establishing and managing digital identities for workloads running in trusted execution environments, where traditional identity mechanisms may not suffice due to the isolated and encrypted nature of confidential computing. Discover best practices for authenticating and authorizing workloads within secure enclaves, understand the role of attestation in workload identity verification, and examine how to integrate identity management systems with confidential computing platforms. Gain insights into emerging standards and protocols that enable secure workload-to-workload communication while maintaining the privacy and integrity guarantees of confidential computing. Understand the implications of workload identity for zero-trust architectures and learn practical approaches for implementing robust identity solutions that work seamlessly with technologies like Intel SGX, AMD SEV, and ARM TrustZone.
Syllabus
Workload Identity for Confidential Computing 2025-06-03
Taught by
Confidential Computing Consortium