Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Workload Identity for Confidential Computing

Confidential Computing Consortium via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this 35-minute conference talk from the Confidential Computing Consortium. Explore the unique challenges of establishing and managing workload identities within trusted execution environments (TEEs) where traditional identity mechanisms may not apply. Discover best practices for authenticating and authorizing workloads running in confidential computing platforms while maintaining the security guarantees of hardware-based isolation. Examine practical approaches to identity attestation, key management, and secure communication between confidential workloads and external services. Gain insights into emerging standards and protocols that enable seamless integration of identity frameworks with confidential computing architectures, ensuring both security and operational efficiency in privacy-preserving cloud deployments.

Syllabus

Workload Identity for Confidential Computing - 2026-01-27

Taught by

Confidential Computing Consortium

Reviews

Start your review of Workload Identity for Confidential Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.