Updated: March 21, 2022 (February 28, 2022)
Analyst ReportConfidential Computing Protects Data in Use
- New Azure VM series enable full or partial encryption of running workload in memory, improving security against attacks.
- Referred to as confidential computing, these capabilities enable new use scenarios that could interest highly regulated or security-conscious organizations.
Confidential computing technologies leverage CPU hardware advances to support Trusted Execution Environments (TEEs), which are secure areas of memory that can be encrypted and verified (attested), providing runtime security against advanced attacks such as those from compromised hypervisors. Whereas disk and network encryption protect data “at rest” and data “in transit,” confidential computing technologies enable protection for data “in use.”
New Azure VM types provide key building blocks for TEEs, protecting data in use by applying encryption and other technologies to VMs and applications in memory. However, making full use of confidential computing may require changes in server applications or deployment practices.
Atlas Members have full access
Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.
Membership OptionsAlready have an account? Login Now