Updated: March 21, 2022 (February 28, 2022)

  Analyst Report

Confidential Computing Protects Data in Use

My Atlas / Analyst Reports

1,138 wordsTime to read: 6 min
Barry Briggs by
Barry Briggs

Before joining Directions on Microsoft in 2020, Barry worked at Microsoft for 12 years in a variety of roles, including... more

  • New Azure VM series enable full or partial encryption of running workload in memory, improving security against attacks.
  • Referred to as confidential computing, these capabilities enable new use scenarios that could interest highly regulated or security-conscious organizations.
     

Confidential computing technologies leverage CPU hardware advances to support Trusted Execution Environments (TEEs), which are secure areas of memory that can be encrypted and verified (attested), providing runtime security against advanced attacks such as those from compromised hypervisors. Whereas disk and network encryption protect data “at rest” and data “in transit,” confidential computing technologies enable protection for data “in use.”  

New Azure VM types provide key building blocks for TEEs, protecting data in use by applying encryption and other technologies to VMs and applications in memory. However, making full use of confidential computing may require changes in server applications or deployment practices.


Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now