Today, some major technology companies adopt a new security model called confidential computing to protect all data types better. Confidential computing is a new method of encrypting data while running in memory. Confidential computing makes it possible to create security plugins to process encrypted data in memory, and this has become an increasing concern for vulnerabilities in the IT environment.
Other leading cloud providers such as Google, Microsoft, and Amazon all have confidential computing products. Earlier this year, Microsoft released DCsv2 series VMs as part of its Azure confidential computing products. Last year, Amazon launched its own confidential processing product, the Nitro Enclaves, at Invent 2019, and is now available for preview. Also, Google and Microsoft are part of the Confidential Computing Partnership, dedicated to partnering with confidential computing. This shows us that confidential computing will be more important in the future.
Confidential Computing is a term defined by Consortium (Confidential Computing Consortium). This is a basic service dedicated to defining and accelerating the adoption of confidential computing. Consortium defines stealth computing, such as protecting data used by performing computations in a reliable hardware-based execution environment.
How can confidential computing help, and why do we need it?
Confidential computing can easily switch between different environments without exposing sensitive and important data. Confidential computing is designed to protect your code and data from damage. A hardware-based Trusted Execution Environment (TEE) can provide confidential computing, but other data protection methods are called encryption and trusted platform module (TPM).