Azure confidential computing
Azure confidential computing offers solutions to enable the isolation your sensitive data while it's being processed in the cloud. Learn how to create and deploy applications based on confidential computing infrastructure by reading concepts, completing tutorials, and working with code samples. Use Microsoft products built on confidential computing to keep your workloads as secure as possible.
Azure confidential computing
Overview
- What is confidential computing?
- What is Azure confidential computing?
- Choose your confidential computing offering
Quickstart
Concept
- Microsoft Azure Attestation
- Azure Confidential Ledger
- Trusted Hardware Identity Management
- Trusted launch
- Azure Key Vault Managed HSM
- Azure IoT Edge
What's new
Confidential Virtual Machines
Overview
- Azure Confidential VM options on AMD
- Virtual Machines based on AMD processors with SEV-SNP technology
Concept
Quickstart
- Create an AMD confidential VM in the Azure portal
- Create an AMD confidential VM with ARM template
- Create an AMD confidential VM with Azure CLI
How-To Guide
Reference
- AMD confidential VMs FAQ
- DCasv5 and DCadsv5-series virtual machines
- ECasv5 and ECadsv5-series virtual machines
- Availability
What's new
Container compute
Overview
Quickstart
- CLI based provisioning with a hello from enclave container app on AKS
- Confidential containers with Intel SGX quickstart
- App enclave aware container samples
- Confidential node pools on AKS
Reference
- Azure architecture center confidential container scenarios
- About Azure Kubernetes Service (AKS)
- App enclave nodes on AKS FAQ
video
- Overview of confidential computing Intel SGX nodes on AKS
- Python hello world demo with Intel SGX based confidential containers on AKS
- Confidential big data analytics with Apache Spark in enclaves