Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement workload identity solutions specifically designed for confidential computing environments in this 35-minute conference talk from the Confidential Computing Consortium. Explore the unique challenges of establishing and managing workload identities within trusted execution environments (TEEs) where traditional identity mechanisms may not apply. Discover best practices for authenticating and authorizing workloads running in confidential computing platforms while maintaining the security guarantees of hardware-based isolation. Examine practical approaches to identity attestation, key management, and secure communication between confidential workloads and external services. Gain insights into emerging standards and protocols that enable seamless integration of identity frameworks with confidential computing architectures, ensuring both security and operational efficiency in privacy-preserving cloud deployments.
Syllabus
Workload Identity for Confidential Computing - 2026-01-27
Taught by
Confidential Computing Consortium