Confidential Computing
Confidential Computing protects sensitive data, code, and secrets even against root users having complete control over operating systems and hypervisors. In this way, one can extend the benefits of cloud computing to sensitive workloads like processing electronic health records. It can also be used to protect intellectual property or for secure collaboration between partners. Dive deep into confidential computing with this comprehensive module, where you'll explore everything from foundational principles to advanced techniques. Gain hands-on experience with SCONE, SGX, and cloud-native solutions as you learn to develop secure applications, optimize performance, and manage complex security policies. Whether it’s mastering attestation, implementing zero trust architectures, or managing encrypted data with Vault and HSM, this course equips you with the skills to tackle today’s most pressing security challenges. By the end, you’ll be ready to implement robust confidential computing solutions in real-world scenarios.
Organization
Schedule and Location |
Times and rooms may still change! Lecture
Excercise
|
Starting date |
Lecture: 16.10.24 |
People | Lecturer: Christof Fetzer |
Q&A | Opal |
Language | English |
Hours per week | 2/2/- SWS |
Registration | Please register in SELMA and Opal. |
Final exam | Written exam: TBA |
Module | INF-BAS4, INF-VERT4, INF-LE-Eul, INF-DSE-20-E-PODS, NES-11 06 06 Systems Engineering |
---|
Material for Lectures and Exercises
Lecture Slides
Date | Lecture slides | Lecturer |
16.10.2024 | Prof. Fetzer | |
23.10.2024 | Prof. Fetzer | |
30.10.2024 | Prof. Fetzer | |
6.11.2024 | Prof. Fetzer | |
13.11.2024 |
Prof. Fetzer | |
20.11.2024 | Prof. Fetzer | |
27.11.2024 | Prof. Fetzer | |
04.12.2024 | Prof. Fetzer | |
11.12.2024 | Prof. Fetzer | |
18.12.2024 | Prof. Fetzer | |
05.01.2025 | Prof. Fetzer | |
12.01.2025 | Prof.Fetzer |
Exercises
Date | Exercise Slide | Tutor | Remark |
17.10.2024 | Exercise 1 Introduction on how to build confidential apps SCONE CAS policies (Protect arguments, Protect environment variables) |
ardhi | |
24.10.2024 | Exercise 2 SCONE Service Access Token SCONE OTP |
Usama | |
07.11.2024 |
Exercise 3 |
Ardhi | |
14.11.2024 | Exercise 4 Kubernetes-Based Exercises (simplify CAS and LAS setup) Attestation of Programs |
Usama | |
21.11.2024 |
Exercise 5 |
Robert | |
28.11.2024 | Exercise 6 Building Confidential Images & Applications Flask Demo |
pubudu | |
5-12-2024 | Exercise 7 Installing CAS(Using kubectl plugin) Exercise-ceremony-website |
Julius | |
12.12.2024 | Exercise 8 Exercise-ceremony-website-determine-state-of cluster Software Updates |
André | |
19.12.2024 | Exercise 9 Protecting Pooled Data Using Confidential Computing Network Sheild |
pubudu | |
09.01.2025 | Exercise 10 Policies and multiple stakeholders Encrypted Files Assignment- 1 - Multi-Stakeholder Application |
Julius | |
16.01.2025 | Exercise 11 Setup a Central CAS Signing Flow |
Huyen | |
23.01.2025 |
Exercise 12 |
Disclaimer
We are not affiliated with any of the commercial websites we might link on this page to. The links are only for informational purposes. We suggest you always consider obtaining a copy from the library before performing a purchase.