Introduction to Confidential Computing
Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers and into the public cloud, due to a set of security concerns. To address these challenges, what we need is a way to perform a privacy-preserving computation that can protect the confidentiality and integrity of your workload. Confidential computing achieves this by running your workload in a hardware-encrypted execution environment, that is isolated from the cloud provider’s privileged system software (e.g. hypervisor, host OS, and firmware), as well as its employees.