Azure confidential computing – part 1

fig : confidential computing - protecting data in use
fig : confidential computing - protecting data in use

Hi All,

Greetings for the day!!!

Today new learnings so sharing ! SHARING IS CARING 🙂

Background / Details

  • For one of our project we need to develop the Azure confidential virtual machine – we are doing POC for storing some very business critical data (highly confidential data)
  • So started exploring Azure confidential computing and sharing details
  • In this article we will touch base about Confidential Computing and Azure Confidential Computing concepts and will explore details in further upcoming articles
  • In next upcoming articles we will discuss – creating Azure confidential virtual machines

In this article we will discuss about Confidential Computing and Azure Confidential Computing

Take away from this article

  • Understand the concept of Confidential Computing
  • Understand Azure Confidential Computing
  • Azure Confidential Computing offerings
  • Azure Confidential Computing resources

What is Confidential Computing

  • Confidential computing is an industry term defined by the Confidential Computing Consortium (CCC)
  • CCC – a foundation dedicated to defining and accelerating the adoption of confidential computing
  • The CCC defines confidential computing as: The protection of data in use by performing computations in a hardware-based Trusted Execution Environment (TEE).
  • A TEE is an environment that enforces execution of only authorized code.
  • Any data in the TEE can’t be read or tampered with by any code outside that environment.
  • The confidential computing threat model aims at removing or reducing the ability for a cloud provider operator and other actors in the tenant’s domain to access code and data while being executed.
  • When used with data encryption at rest and in transit, confidential computing protects sensitive or highly regulated data sets and application workloads in a secure public cloud platform.
  • TEEs are also being used to protect proprietary business logic, analytics functions, machine learning algorithms, or entire applications
fig : confidential computing - protecting data in use
fig : confidential computing – protecting data in use (image courtesy – Microsoft site)

Azure confidential computing

Azure provides following suite of offerings for for running our applications confidentially

Also following computing resources

References

In next article we will discuss Confidential Virtual Machines

Thanks for reading !! If its worth at least reading once, kindly please like and share !!! SHARING IS CARING 🙂

Enjoy the beautiful life !! Have a FUN !! HAVE A SAFE LIFE !! TAKE CARE 🙂

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading