# Welcome

{% hint style="info" %}
This documentation is a work in progress and subject to updates and revisions. Keep an eye out for version changes and new additions to ensure you have the latest information.
{% endhint %}

{% hint style="info" %}
This documentation assumes that you have a foundational understanding of computer architecture, information security, cryptography and familiarity with basic cloud computing concepts. If you are new to cloud computing or lack the necessary knowledge, we recommend exploring introductory tutorials on Virtual Machines, [Docker](https://docs.docker.com/), and [Kubernetes](https://kubernetes.io/docs/home/) before proceeding.
{% endhint %}

In an era defined by escalating concerns over data privacy and security breaches, the demand for innovative solutions to safeguard sensitive information has never been more pressing. Enter confidential computing, a paradigm-shifting approach that promises to revolutionize how we handle and process data in the digital age. By enabling computations on encrypted data without compromising confidentiality, confidential computing opens up a realm of possibilities for industries ranging from finance to healthcare, where preserving the privacy and integrity of data is paramount. In this technical documentation, we delve into the intricacies of confidential computing, exploring its principles, applications, and the transformative impact it holds for the future of secure data processing in the cloud.

## Confidential Computing

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>What is Confidential Computing</td><td></td><td></td><td><a href="confidential-computing/what-is-confidential-computing">what-is-confidential-computing</a></td></tr><tr><td>What Problems solves Confidential Computing</td><td></td><td></td><td><a href="confidential-computing/what-problems-confidential-computing-solves">what-problems-confidential-computing-solves</a></td></tr><tr><td>Why Confidential Computing</td><td></td><td></td><td><a href="confidential-computing/why-confidential-computing">why-confidential-computing</a></td></tr><tr><td>How Confidential Computing works</td><td></td><td></td><td><a href="confidential-computing/how-confidential-computing-works">how-confidential-computing-works</a></td></tr><tr><td>Technologies</td><td></td><td></td><td><a href="confidential-computing/hardware-secure-enclave">hardware-secure-enclave</a></td></tr><tr><td>Cloud Service Provider</td><td></td><td></td><td><a href="confidential-computing/cloud-service-providers">cloud-service-providers</a></td></tr></tbody></table>

## By Technology

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td></td><td>AMD SEV SNP</td><td></td><td><a href="technology-in-depth/amd-sev">amd-sev</a></td></tr><tr><td></td><td>Intel TDX</td><td></td><td><a href="technology-in-depth/intel-tdx">intel-tdx</a></td></tr><tr><td></td><td>Intel SGX</td><td></td><td><a href="technology-in-depth/intel-sgx">intel-sgx</a></td></tr><tr><td>ARM CC</td><td></td><td></td><td><a href="technology-in-depth/arm-cc">arm-cc</a></td></tr><tr><td>RISC-V AP-TEE</td><td></td><td></td><td></td></tr><tr><td>NVIDIA CC</td><td></td><td>(work in progress)</td><td></td></tr></tbody></table>

## Open Source Tooling&#x20;

<table data-card-size="large" data-view="cards"><thead><tr><th data-type="content-ref"></th></tr></thead><tbody><tr><td><a href="technology-in-depth/intel-sgx/enclaive-development-kit">enclaive-development-kit</a></td></tr><tr><td><a href="technology-in-depth/intel-sgx/vault-remote-attestation-plug-in">vault-remote-attestation-plug-in</a></td></tr></tbody></table>
