Azure Confidential Compute

There are ways to secure data at rest and in transit, but you need to protect your data from threats as it’s being processed. Now you can. Confidential computing adds new data security capabilities using trusted execution environments (TEEs) or encryption mechanisms to protect your data while in use. TEEs are hardware or software implementations that safeguard data being processed from access outside the TEE. The hardware provides a protected container by securing a portion of the processor and memory. Only authorized code is permitted to run and to access data, so code and data are protected against viewing and modification from outside of TEE.

More details about Confidential Compute can be found here. If you have a technical issue, please open a post on the developer forums through Stack Overflow or MSDN.

Do you have an idea or feedback based on your experience with Azure Confidential Compute?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Reading

    With all the conditions, Terms and over the footer plenty of Text in which is actually better too see how services can be implemented.

    As my own functionalities good idea as hyperlinks are something that is avoiding from experience.

    Picture taken by Samsung Galaxy it's a mobile phone.
    Persiselty what makes cloud computing and services in cyber security is taken extremely seriously academic or experienced by disaster recovery to education in a sense of inducing the way society has treated.

    1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New  ·  Flag idea as inappropriate…  ·  Admin →
  3. Compatible for operations

    Human interaction for gavering source information from danger to the office azure balance between the two although i personally have only self tought.

    Problem is because human interaction has not been interacted with a huge advance in government agencies in individual with a great way of outstanding particular intelligence.

    Tho intelligence is many complex yet again!

    IF only there was a scout or recruiter in process in the UK for more than a education or c of 99% from human cyber analysis that egzaduration is implemented.

    1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Top Ideas  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Azure Confidential Compute

Feedback and Knowledge Base