Data in use
Let’s get started!
Problem
How do I protect data in use?
Context
Today, data is often encrypted at rest in storage and in transit across the network, but applications and the sensitive data they process are vulnerable to unauthorized access and tampering at runtime. Most governments and highly regulated industries that deal with sensitive and Personal Identifiable Information (PII) are concerned about protecting their data while in use. This is required from regulation requirements as well as from data privacy standards. This pattern discusses the way to leverage technologies and systems to protect the security and confidentiality of such customer data.
Solution
Confidential computing, as shown in the following diagram, protects data and applications by running them in secure enclaves that isolate the data and code to prevent unauthorized access, even when the compute infrastructure is compromised. While confidential computing is revolutionizing...