Workload Identity for Confidential Computing - 2025-10-14
Confidential Computing Consortium via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this comprehensive webinar. Explore the unique challenges of establishing and managing digital identities for workloads running in trusted execution environments (TEEs) and secure enclaves. Discover best practices for authentication, authorization, and identity verification in confidential computing scenarios where traditional identity mechanisms may not suffice. Examine real-world use cases and implementation strategies for workload identity in cloud-native confidential computing deployments. Gain insights into the intersection of zero-trust security models and confidential computing, including how to leverage hardware-based attestation for workload identity verification. Understand the role of cryptographic protocols and secure key management in establishing trusted workload identities within confidential computing frameworks.
Syllabus
Workload Identity for Confidential Computing - 2025-10-14
Taught by
Confidential Computing Consortium