Embed presentation
Downloaded 13 times


























The document discusses the integration of trusted computing in Kubernetes secure runtimes, emphasizing the need for a secure base and system trust through trusted platform modules and attestation. It outlines a two-pronged approach involving authentication and admission controllers to verify system state and ensure secure access. A proof of concept implementation using JSON-based policy is mentioned, along with a question about the potential for in-tree integration.
























