Confidential computing
Confidential computing involves the use of hardware-based Trusted Execution Environments (TEEs) to protect data while it is being used. TEEs are secure and isolated environments that keep applications and data from being accessed or changed while they are in use. A group called the Confidential Computing Consortium came up with this security standard.
The three states of end-to-end encryption are as follows:
- Encryption at rest: This protects your data while it is being stored
- Encryption in transit: This protects your data when it is moving between two points
- Encryption in use: This protects your data while it is being processed
Confidential computing gives you the last piece of end-to-end encryption: encryption in use.
Key features of Google Cloud Confidential Computing
When you use a Confidential VM, your data and applications stay private and encrypted even when they are being used. This is a type of Compute Engine VM. It runs...