Whitepapervault Com
confidentialcomputing.io A Technical Analysis of Confidential Computing A Publication of The Confidential Computing Consortium October 2021, v1.2 confidentialcomputing.io Changelog Table Version Release Date Change
Updated title, link to Outreach white paper, and wording / grammat ical corrections.
Contents
About the Confidential Computing Consortium 16 References 17 Confidential Computing Consortium 4Confidential Computing Deep Dive v1.2
In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit,” data in storage is “at rest,” and data being processed is “in use.” In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever. Cryptography is now commonly deployed to provide both data confidentiality (stopping unauthorized viewing) and data integrity (preventing or detecting unauthorized changes). While techniques to protect data in transit and at rest are now commonly deployed, the third state – protecting data in use – is the new frontier. A Confidential Computing Consortium whitepaper [1] provides an overview of how Confidential Computing addresses this problem, along with use cases and motivation. This paper provides more details for a technical audience.