Confidential Containers

Confidential Containers

Running Sensitive Workloads with Hardware‑Backed Isolation

von Trex Team

€8,62 inkl. MwSt.
Format: EPUB DRM: Kein DRM 3.4 MB

Beschreibung

"Confidential Containers: Running Sensitive Workloads with Hardware‑Backed Isolation"
Modern cloud platforms excel at shipping software fast—until the workload includes secrets you can’t afford to expose to the infrastructure running it. This book is for experienced engineers and architects who already live in Kubernetes and want to run sensitive workloads with strong, hardware-backed isolation, without abandoning cloud-native delivery. It treats “confidential computing” as an engineering discipline: explicit trust boundaries, defensible threat models, and designs that assume privileged infrastructure may be curious, compromised, or simply out of scope for trust.
You’ll learn the end-to-end mechanics of confidential containers: how VM-based TEEs measure and attest launch state, how evidence is verified, and how policy turns verification into admission and key-release decisions. The book builds a practical runtime architecture (host/guest split, agents, and hardening), then goes deep on attestation semantics, policy lifecycle, and secrets delivery that minimizes plaintext exposure. It also covers real Kubernetes deployment patterns for multi-tenant clusters, node provisioning and drift control, and how to avoid secret leakage through the control plane.
Prerequisites include comfort with Linux, containers, Kubernetes primitives, and basic PKI concepts. Differentiators are the operational focus—update/TCB governance, incident playbooks, observability under confidentiality constraints—and the explicit connections between supply-chain integrity, I/O design, performance trade-

Produktdetails

ISBN 6610001180744
Verlag NobleTrex Press
Erscheinungsdatum 10.03.2026
Sprache Englisch