Cloud Service Providers

Last Update: July 2023

Each cloud provider implements confidential computing using various hardware-based security technologies and may have additional platform-specific features and services. These offerings provide customers with options to run their sensitive workloads in a secure and isolated environment, protecting their data and ensuring confidentiality, integrity, and privacy in the cloud.

Azure Confidential Computing leverages Intel SGX technology and AMD SEV technology. Azure offers several products for confidential computing, including Confidential VMs with Application Enclaves, which protect data by encrypting and isolating it in memory during CPU processing. Confidential VMs provide an easy way to deploy confidential workloads without requiring changes to existing applications or code. Confidential containers are also available, allowing containerized applications to be deployed and managed with a fully managed Kubernetes service.

Additionally, Azure offers other products that enhance confidential computing capabilities, such as SQL Azure Always Encrypted, which enables in-place encryption and confidential queries. Trusted launch improves the security of generation 2 VMs by protecting against advanced and persistent attack techniques. Azure confidential ledger provides a tamperproof data store hosted in trusted execution environments (TEEs) with cryptographically verifiable evidence. Microsoft Azure Attestation allows for the remote verification of platform trustworthiness and binary integrity. Azure Key Vault M-HSM safeguards cryptographic keys and other secrets cloud applications and services use.

Last updated