Trust is a prerequisite of moving to the cloud. When evaluating a cloud provider, you want to know that it helps keep your information is safe, helps protect you from bad actors, and that you’re in control of your workload. Trust has to be maintained starting from hardware and firmware, as well as host and guest operating systems. A guest OS can be dynamically compromised by attacking its kernel components via local or remote attack, by local code gaining escalation privileges, or by malicious insiders. Join this session to learn how you can be confident that workloads running on Google Cloud Platform haven’t been penetrated by boot malware or firmware rootkits.
Original talk by Andrew Honig and Nelly Porter
Rewind by Max Saltonstall
Watch full session here → http://bit.ly/2F9NzzA
Watch more recaps here → http://bit.ly/NextRewind2018
Watch more Security sessions here → http://bit.ly/2zJTZml
Next ‘18 All Sessions playlist → http://bit.ly/Allsessions
Subscribe to the Google Cloud Platform channel! → http://bit.ly/GCloudPlatform
Publisher: Google Cloud
You can watch this video also at the source.