Workload Identity for Confidential Computing - 2025-10-28
Confidential Computing Consortium via YouTube
-
34
-
- Write review
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore workload identity management within confidential computing environments in this 54-minute conference talk from the Confidential Computing Consortium. Learn how to establish, verify, and manage identities for workloads running in trusted execution environments (TEEs) and secure enclaves. Discover the challenges of identity attestation in confidential computing scenarios where traditional identity mechanisms may not apply due to the isolated and encrypted nature of the compute environment. Examine practical approaches for implementing workload identity solutions that maintain security guarantees while enabling necessary authentication and authorization processes. Understand the relationship between hardware-based attestation, cryptographic proofs, and workload identity establishment in confidential computing architectures. Gain insights into industry best practices for deploying identity management systems that preserve the confidentiality and integrity properties essential to confidential computing workloads.
Syllabus
Workload Identity for Confidential Computing - 2025-10-28
Taught by
Confidential Computing Consortium