Azure Confidential Computing with Confidential VMs and AKS nodes

Release Date:

Amar Gowda joins Scott Hanselman to show how Azure Confidential Computing protects data in use and helps you achieve data security and data privacy goals within a managed cloud environment. Confidential VM's protect VM-based workloads with memory encryption and code integrity for VM and container workloads. Attestation helps you remotely verify the entire VM is a hardware-based Trusted Execution Environment (TEE). Chapters 00:00 - Introduction 01:20 - Azure Confidential Computing 04:00 - Creating a confidential VM from CLI demo 06:28 - Attestation sample client to verify hardware 12:00 - Extensions and CVM on AKS support 13:09 - AKS demo 20:00 - Wrap-up Recommended resources Azure confidential computing Azure Confidential Computing Blog Azure Confidential Computing customer stories Azure-Samples/confidential-container-samples on GitHub Create a Pay-as-You-Go account (Azure) Create a free account (Azure) Connect Scott Hanselman | Twitter: @SHanselman Amar Gowda | Twitter: @amar_gowda Azure Friday | Twitter: @AzureFriday Azure | Twitter: @Azure

Azure Confidential Computing with Confidential VMs and AKS nodes

Title
Azure Confidential Computing with Confidential VMs and AKS nodes
Copyright
Release Date

flashback