Industry Perspective: Demystifying Confidential Computing

Industry Perspective Demystifying Confidential Computing
By Bruce Kornfeld In computing, data exists in three states: in transit, at rest and in use. Data moving across the network is “in transit,” data residing in some type of storage is “at rest,” and data being processed is “in use.”  As cyberthreats targeted toward network and storage devices are increasingly thwarted by protections that apply to data in transit and at rest, attackers have shifted their focus to data in use. Common attack vectors include memory scraping, CPU side-channel attacks and malware injection.  Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). A TEE is defined as an environment that provides a level of assurance of data integrity, data confidentiality and code integrity.  Security strategists must consider all the different layers of possible...