Workload Identity for Confidential Computing 2025-07-01
Confidential Computing Consortium via YouTube
Master AI and Machine Learning: From Neural Networks to Applications
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this comprehensive webinar from the Confidential Computing Consortium. Explore the unique challenges of establishing and managing digital identities for workloads running in trusted execution environments (TEEs) and secure enclaves. Discover best practices for attestation-based identity verification, cryptographic key management, and secure credential provisioning within confidential computing frameworks. Examine real-world use cases and implementation strategies for workload identity across different confidential computing platforms including Intel SGX, AMD SEV, and ARM TrustZone. Understand how to integrate workload identity with existing identity and access management (IAM) systems while maintaining the security guarantees of confidential computing. Gain insights into emerging standards and protocols for workload identity attestation, including the role of hardware-based roots of trust and remote attestation mechanisms in establishing verifiable workload identities.
Syllabus
Workload Identity for Confidential Computing 2025-07-01
Taught by
Confidential Computing Consortium