The Cloudcast

Confidential Computing


Listen Later

Vikas Bhatia (@vikascb, Head of Product, Azure Confidential Computing) and Ron Perez (@ronprz, Intel Fellow, Security Architecture) talk about the technologies and architecture behind Azure Confidential Computing

SHOW: 472

SHOW SPONSOR LINKS:

  • CloudAcademy -Build hands-on technical skills. Get measurable results. 
  • Get 50% of the monthly price of CloudAcademy by using code CLOUDCAST
  • Datadog Security Monitoring Homepage - Modern Monitoring and Analytics
  • Try Datadog yourself by starting a free, 14-day trial today. Listeners of this podcast will also receive a free Datadog T-shirt.
  • BMC Wants to Know if your business is on its A-Game
  • BMC Autonomous Digital Enterprise


CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw

PodCTL Podcast is Back (Enterprise Kubernetes) - http://podctl.com

SHOW NOTES:

  • Azure Confidential Computing
  • Intel and Microsoft Azure partnership page
  • Intel® SGX: Moving Beyond Encrypted Data to Encrypted Computing
  • Confidential Computing Consortium (website)


Topic 1 - Welcome to the show. Before we dig into today’s discussion, can you give us a little bit about your background?

Topic 2 - Defense in Depth is a strategy that has long been in place in Enterprise computing. We’ve seen previous approaches that connected the OS or Application with the Hardware (e.g. Intel TXT). How has this space evolved over the last few years, and what are some of the reasons why we need another level of depth?

Topic 3 - Let’s talk about the technology basics of Confidential Computing. What are the software elements (Application, OS, SDK) and what are the hardware elements? 

Topic 4 -  What is the normal migration path for a company to move workloads into Confidential Computing environments? Is this primarily for new workloads, or does it apply to existing applications too? 

Topic 5 - Azure has the ability to deliver either Confidential VMs, or recently added Confidential containers along with AKS. When does it make sense to be confidential in one part of the stack vs. other? 

Topic 6 - What are some areas where you’re seeing the broader ecosystem (e.g. technology partners or end-user customers) beginning to expand out the functionality of Confidential Computing?


FEEDBACK?

  • Email: show at thecloudcast dot net
  • Twitter: @thecloudcastnet
...more
View all episodesView all episodes
Download on the App Store

The CloudcastBy Massive Studios

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

147 ratings


More shows like The Cloudcast

View all
Hanselminutes with Scott Hanselman by Scott Hanselman

Hanselminutes with Scott Hanselman

377 Listeners

Software Engineering Radio - the podcast for professional software developers by se-radio@computer.org

Software Engineering Radio - the podcast for professional software developers

272 Listeners

The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

283 Listeners

a16z Podcast by Andreessen Horowitz

a16z Podcast

1,030 Listeners

Thoughtworks Technology Podcast by Thoughtworks

Thoughtworks Technology Podcast

41 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

592 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

625 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

202 Listeners

Gartner ThinkCast by Gartner

Gartner ThinkCast

110 Listeners

DataFramed by DataCamp

DataFramed

266 Listeners

Kubernetes Podcast from Google by Abdel Sghiouar, Kaslin Fields

Kubernetes Podcast from Google

181 Listeners

Practical AI by Practical AI LLC

Practical AI

190 Listeners

The Stack Overflow Podcast by The Stack Overflow Podcast

The Stack Overflow Podcast

64 Listeners

The Real Python Podcast by Real Python

The Real Python Podcast

140 Listeners

The Pragmatic Engineer by Gergely Orosz

The Pragmatic Engineer

52 Listeners