What you've learned

You should now know how to:

  • Describe the importance of attestation for confidential computing.
  • Understand what a CCA attestation token is, and describe its format.
  • Inspect the contents of a CCA attestation token using command-line tools.
  • Use an attestation verification service to evaluate a CCA attestation token.
  • Understand the purpose of the Open source Veraison project.

Knowledge Check

A secure boundary is sufficient for confidential computing.

The CCA attestation token is divided at the top level into two sub-tokens.


Back
Next