The presentation discusses the challenges and considerations in implementing trusted computing in a Kubernetes environment.
- Trusted computing is not a silver bullet and requires careful consideration of the attack surface and minimizing it
- Enclaves have shortcomings and are susceptible to side channel attacks
- Compliance with government standards such as NIST can be achieved with enclaves
- Hardware components are susceptible to tampering and must be carefully evaluated
- Kubernetes can use trusted computing at the container level, but the control plane should be constrained to minimize attack surface