Learn about Confidential Computing Attestation
Blog: Red Hat Middleware Blog
This post series presents various forms of attestation for various Confidential Computing use cases. Confidential Computing is a set of technologies designed to protect data in use, for example using memory encryption. Data at rest (on disk) and data in transit (over the network) can already be protected using existing technologies. Attestation, generally speaking, is the process of proving some properties of a system. Attestation plays a central role in asserting that confidential systems are indeed confidential.
This series focuses on four primary use cases:
Confidential virtual mach
Leave a Comment
You must be logged in to post a comment.