# Why Confidential Computing

Cloud computing allows organizations of all sizes to achieve cost savings. Through the implementation of confidential computing, sensitive information remains protected throughout its entire life cycle, from leaving a company's premises to entering the cloud infrastructure.

Confidential cloud computing ensures end-to-end protection, minimizes reliance on processors and their vendors, and reduces the level of trust required in the software stack. As a result, even if adversaries attempt to intercept network transmission, access disk storage, or infiltrate main memory, they cannot access the data as they are all encrypted.

While the advantages of using our solution can vary across different platforms, it's important to highlight the following key benefits in general:

## Robust Security Protections

Even in the face of compromised BIOS, Virtual Machine Manager (VMM), OS, and drivers, Hardware secure enclave can still protect your application against:

* Kernel-space exploits
* Malicious insider attacks
* Accidental privilege misuse
* UEFI firmware exploits
* Other root attacks attempt to infiltrate and corrupt the network and system.

The enhanced security and reduced attack surface make it harder for adversaries to exploit vulnerabilities.

## Reliable Privacy Protections

* The code within the enclave remains secure and inaccessible even if an attacker gains full execution control over the platform.
* The memory protections provided by hardware secure enclave thwart memory bus snooping, memory tampering, and cold-boot attacks on data stored in RAM.
* The confidentiality and integrity of data, program code, and protocol messages are never compromised or de-anonymized.

## Zero-Trust Infrastructure

* The trusted computing base of the parent application is minimized to the smallest possible footprint.
* Migrating to a (public) cloud environment while maintaining the trust and security of the own on-premise infrastructure.

## Easy to Deploy

* In any hosting environment, irrespective of geographical location and platform.
* Out-of-the-box deployment support. *One small step for a developer, one giant leap for a zero-trust infrastructure.*

## Comply with Regulations

* Privacy export regulation, such as [Schrems-II](https://www.europarl.europa.eu/RegData/etudes/ATAG/2020/652073/EPRS_ATA\(2020\)652073_EN.pdf).
* [GDPR](https://gdpr-info.eu/)/[CCPA](https://oag.ca.gov/privacy/ccpa), processing user data (***data in use***) in the cloud.
* Better [TOMs](https://www.knowyourcompliance.com/gdpr-technical-organisational-measures/) (Technical and Organizational Measures).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.enclaive.cloud/confidential-cloud/confidential-computing/why-confidential-computing.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
