In the previous sections, we covered how to secure data at rest and in transit, but you also need to protect data from threats as it's being processed. In many cases, poorly configured access control will result in breaches. However, most breaches can be traced to data that is accessed while it is in use. This can be done through administrative accounts and by using compromised keys to access the encrypted data. This is the main reason why customers are not willing to move their most sensitive data to the cloud.
Azure confidential computing offers protection for data in use. By using Trusted Execution Environments (TEEs) or encryption mechanisms to protect your data while in use, new data security capabilities are added by confidential computing. This means that data can be processed in the cloud with the assurance that it is always under customer control. A TEE can be implemented using hardware or software. The hardware secures a portion...