Skip to main content

17 posts tagged with "Event"

View All Tags

The Confidential Computing Consortium launched under the Linux Foundation umbrella two years ago. It continues to grow and thrive. This panel looks at why various partners joined and continue to join, the deal for partners, the challenges of managing a non-profit, and the importance of establishing culture early. It tackles it from multiple perspectives (start-ups and well established public companies, and levels of membership). The panel participants have broad experience across a number of non-profit organizations in the broad open source community. The group also represents a diversity of perspectives of the workings of the committees of the Consortium.

Source: Open Source Summit 2021

Link: https://osselc21.sched.com/event/lAUA/panel-discussion-evolving-the-confidential-computing-consortium-non-profit-collaboration-for-growth-stephen-walli-aeva-black-microsoft-mike-bursell-congruus?iframe=no

Mike Bursell

In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast provides an introduction and explanation of Confidential Computing and features a panel of industry architects responsible for defining Confidential Compute

Source: SNIA

Link: https://www.youtube.com/watch?v=HnLfKUI0_Y4

Mike Bursell
Nathaniel McCallum

How fully can organizations trust the host on which they run their applications? Not just the software stack, but the sysadmins, BIOS, firmware, and the rest? Project Enarx uses TEEs to allow companies to run sensitive applications on fundamentally untrusted hosts, with a minimum trusted compute base. Learn how Enarx combines TEEs, Rust, and WebAssembly to protect workloads.

Source: RSA Conference 2021

Link: https://www.youtube.com/watch?v=ajYWSAwIyPs

Mike Bursell
Nathaniel McCallum

If you’re designing a project where security is uppermost, but you want to make it easy to use and compatible with multiple platforms (existing and future), what principles should you follow, and how do they translate into an architecture and actual code. We’ll present the 10 security design principles of the Enarx project, and discuss why they led us to where we are today: a Rust-based open source project with a WebAssembly run-time.

Source: FOSDEM 2021

Link: https://fosdem.org/2021/schedule/event/tee_enarx/

Mike Bursell
Nathaniel McCallum

As the requirement for confidential computing increases, there is a need for portability of workloads between clouds, the Edge and beyond.Enter Enarx.  Coded in Rust from the ground up to provide confidential computing and portability. Enarx is a platform built to operate across hardware platforms and run any code compiled in WebAssembly. Enarx is a completely open source project, working across hardware solutions and welcoming contributors up and down the stack.  Find out about where we are now, what you might be able to help with next, and learn how it might fit in your deployment plans.

Source: Confidential Computing Consortium

Link: https://confidentialcomputing.io/webinar-enarx/

Mike Bursell
Nathaniel McCallum

Deploying applications to the Cloud (or IoT, or the Edge) is all very well ... until you start running sensitive workloads. Can you trust the OS? The hypervisor? The stack? The cloud provider? The host owner? We all know that the answer to all of these is not always "yes": Enarx is a project using the hardware-based secuirty of TEEs (Trusted Execution Environments), to reduce the number of components and parties you need to trust. Find out how it works, why it uses WebAssembly for your runtime, and how to contribute.

Source: DevConf 2020

Link: https://www.youtube.com/watch?v=y_eDNTIkBBE

Axel Simon

Traditionally, when you run a workload in a VM, container or in a serverless environment, that workload is vulnerable to interference by any person or software with hypervisor, root or kernel access. That turns out to be quite a few people one has little choice but to trust, both in the cloud, of course, but also on one’s own hardware. The Enarx project aims to mitigate this by leveraging the hardware-based security properties offered by the Trusted Execution Environments (TEEs) found on recent CPUs. Enarx will make it simple to deploy workloads to a variety of TEEs in the public cloud, making it possible to deploy confidential workloads to third party servers without needing to relinquish trust to those who operate them.

Source: Pass the SALT

Link: https://passthesalt.ubicast.tv/videos/2020-enarx-secured-attested-execution-on-any-cloud/

Mike Bursell
Nathaniel McCallum

Encryption in transit: done. Encryption at rest: done. Encryption in use? That's what Enarx aims to solve using TEEs and by providing a practical application deployment system plus hardware attestation. This demo from Mike Bursell and Nathaniel McCallum will show basic Enarx functionality on actual hardware.

Source: Red Hat Community Central

Link: https://www.youtube.com/watch?v=5wrQSe-IdMI

Mike Bursell

How fully can you trust the host you run your applications on—not just the software stack, but the sysadmins, BIOS, firmware and more? This webcast will show you how Enarx, a Red Hat open-source project, uses trusted execution environments to allow you to run sensitive applications on fundamentally untrusted hosts.

Source: RSA Conference 2020

Link: https://www.youtube.com/watch?v=AQD5enwA6aM

In this talk, we will explain the security and confidentiality implications of current software deployment, the possibilities offered by Trusted Execution Environments as well as the new challenges they create, and present Enarx, a project supported by Red Hat and part of the Confidential Computing Consortium, which works to streamline secure software deployment while maintaining the highest security standards.

Source: DevConf.CZ 2020

Link: https://www.youtube.com/watch?v=0MPCT2ocFIo

Sergio Lopez

Cloud-based services have introduced a new kind of workload composed mainly by short-lived, ephemeral processes. This is a significant departure from traditional virtualization workloads, where VMs (Virtual Machines) are expected to run uninterrupted for a large amount of time, even surviving Host migrations. New needs called for new optimization techniques, which in turn triggered the creation of specialized VMMs (Virtual Machine Monitors) and the adaptation of the existing ones, alongside with the development of new isolation techniques.

Source: DevConf.CZ 2020

Link: https://www.youtube.com/watch?v=ZXSCIYbop0g

Enarx - Attested, Secured Execution with AMD’s SEV - Nathaniel McCallum, Red Hat, Inc. & David Kaplan, Advanced Micro Devices, Inc. AMD SEV (Secure Encrypted Virtualization) is a new CPU security technology available in AMD's EPYC processors and provides new levels of protection for virtualized workloads. AMD SEV can encrypt the memory and register state of VMs individually, isolating them from the hypervisor. Enarx is an open source project led by Red Hat, leveraging TEEs, and providing attestation and protection for run-time workloads. It is written in Rust and aims to reduce the number of trust relationships required when running executables in the private or public cloud. It currently supports AMD SEV, and this session will: a) Discuss SEV capabilities and roadmap; b) Introduce the Enarx architecture; c) Present some of the components of Enarx; d) Show a demonstration of an early set of Enarx capabilities.

Source: Linux Security Summit 2019

Link: https://www.youtube.com/watch?v=0-ISmJNxGiY