Workload Identity for Confidential Computing 2025-07-01
Confidential Computing Consortium via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this comprehensive webinar from the Confidential Computing Consortium. Explore the unique challenges of establishing and managing digital identities for workloads running in trusted execution environments (TEEs) and secure enclaves. Discover best practices for attestation-based identity verification, cryptographic key management, and secure credential provisioning within confidential computing frameworks. Examine real-world use cases and implementation strategies for workload identity across different confidential computing platforms including Intel SGX, AMD SEV, and ARM TrustZone. Understand how to integrate workload identity with existing identity and access management (IAM) systems while maintaining the security guarantees of confidential computing. Gain insights into emerging standards and protocols for workload identity attestation, including the role of hardware-based roots of trust and remote attestation mechanisms in establishing verifiable workload identities.
Syllabus
Workload Identity for Confidential Computing 2025-07-01
Taught by
Confidential Computing Consortium