9
Confidential Computing – What, Why, and the Current State
Data protection is a critical consideration for enterprises that handle sensitive data, which can be personal or non-personal. There are three primary states in which data can exist within an organization: data at rest, data in motion, and data in memory. Each state has unique security and privacy concerns that require different methods of security and data protection. In this chapter, you will learn about confidential computing, including what it is, why it is required, how it helps protect data in memory attacks, and the current state of the technology.
We will cover the following main topics:
- Privacy/security attacks on data in memory:
- Introduction of confidential computation
Get Privacy-Preserving Machine Learning now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.