Understanding Attestation in Confidential Computing: Supply Chain Security

preview_player
Показать описание

This is the second part of our series on attestation in Constellation and covers Constellation’s node images. In the previous video we how explained how Constellation’s node images can be verified using remote attestation and measured boot. In this video, we see how we go from source code to verifying the first node in our cluster, making sure the entire supply chain is secure and verifiable. We can verify that the image we have booted and the cluster we have bootstrapped correspond to that exact version of the source in the repository.

Subscribe!📤
Рекомендации по теме