Attestation in confidential computing

This article is the second in a six-part series (see our previous blog), where we present various usage models for confidential computing, a set of technologies designed to protect data in use—for example using memory encryption—and the requirements to get the expected security and trust benefits from t​​he technology.

In this second article, we will focus on attestation, as a method to prove specific properties of the system and components being used.

The need for attestation

In a confidential computing environment, another form of proof called attestation becomes increasingl

This article has been indexed from Red Hat Security

Read the original article: