Back to Glossary

Cybersecurity & Risk

Confidential Computing

Confidential Computing protects data in use by performing computation within a hardware-based trusted execution environment (TEE), ensuring data remains encrypted and isolated even from the cloud provider.

Context for Technology Leaders

For CIOs and Enterprise Architects, Confidential Computing addresses critical data privacy and regulatory compliance challenges, particularly with sensitive workloads in public clouds. It leverages technologies like Intel SGX or AMD SEV to create secure enclaves, mitigating risks associated with insider threats and sophisticated attacks on data during processing, aligning with frameworks like NIST Cybersecurity Framework for enhanced data protection.

Key Principles

  • 1Hardware-based Isolation: Utilizes Trusted Execution Environments (TEEs) to create secure enclaves, isolating data and code from the underlying infrastructure, including the operating system and hypervisor.
  • 2Data in Use Protection: Encrypts data while it is being processed in memory, preventing unauthorized access or modification during runtime, a crucial layer beyond data at rest and in transit.
  • 3Attestation: Provides cryptographic proof that the TEE is genuine and that the correct software is running within it, ensuring the integrity and trustworthiness of the confidential environment.
  • 4Zero Trust Alignment: Reinforces zero-trust architectures by minimizing the attack surface and ensuring that no single entity, not even cloud administrators, can access unencrypted sensitive data.

Related Terms

Trusted Execution Environment (TEE)Homomorphic EncryptionZero-Knowledge ProofsData SovereigntyCloud Security Posture Management (CSPM)Secure Enclave