Confidential Computing – What, Why, and the Current State
Data protection is a critical consideration for enterprises that handle sensitive data, which can be personal or non-personal. There are three primary states in which data can exist within an organization: data at rest, data in motion, and data in memory. Each state has unique security and privacy concerns that require different methods of security and data protection. In this chapter, you will learn about confidential computing, including what it is, why it is required, how it helps protect data in memory attacks, and the current state of the technology.
We will cover the following main topics:
- Privacy/security attacks on data in memory:
- Introduction of confidential computation
- Trusted execution environments (TEE) – attestation of source code and how it helps protect against insider threat attacks
- Industry standards for ML in TEEs
- Confidential Computing Consortium
- Comparison of secure...