Workload Identity for Confidential Computing - 2025-10-07
Confidential Computing Consortium via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore workload identity management within confidential computing environments in this 49-minute conference talk from the Confidential Computing Consortium. Learn how to establish, verify, and manage identities for workloads running in trusted execution environments, examining the unique challenges and solutions for identity attestation in confidential computing scenarios. Discover best practices for implementing secure identity frameworks that maintain privacy and security guarantees while enabling workload authentication and authorization. Understand the technical approaches for binding workload identities to hardware-based trust anchors and the role of attestation in establishing workload credibility. Gain insights into emerging standards and protocols that support workload identity in confidential computing deployments across cloud and edge environments.
Syllabus
Workload Identity for Confidential Computing - 2025-10-07
Taught by
Confidential Computing Consortium