InterSystems Global Summit Hollywood FL June 4-7
Confidential Computing Use Cases
Red Hat News, Tuesday, May 16,2023
May 16, 2023,
Volume 302, Issue 3

In this third article, we consider the four most important use cases for confidential computing: confidential virtual machines, confidential workloads, confidential containers and confidential clusters. This will allow us to better understand the trade-offs between the various approaches, and how this impacts the implementation of attestation.

Usage models of confidential computing

In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally tied to virtualization. A trust domain corresponds to a virtual machine (VM), each domain having its own encryption keys and being isolated from all other domains, including the host the VM is running on.

There are several usage models to consume these basic building blocks: ...

Read More ...

Keywords:

    Other articles in the Red Hat News section of Volume 302, Issue 3:

    See all archived articles in the Red Hat News section.