Skip to content

Commit 1bd33c8

Browse files
authored
Update overview.md
Simplified language, included links to remote attestation Signed-off-by: Ananya Garg <[email protected]>
1 parent fe77f69 commit 1bd33c8

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security/fundamentals/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -298,9 +298,9 @@ You can enable the following diagnostic log categories for NSGs:
298298
The section provides additional information regarding key features in this area and summary information about these capabilities.
299299

300300
### Azure confidential computing
301-
[Azure confidential computing](../../confidential-computing/TOC.yml) makes it easier to trust the cloud provider, by reducing the need for trust across various aspects of the cloud infrastructure. The spectrum of option ranges from enabling "lift and shift" scenarios of existing applications, to a full control of various features of security. There are multiple deployment models supported. These different models support the wide variety of customer security requirements for modern cloud computing.
301+
[Azure confidential computing](../../confidential-computing/TOC.yml) provides the final, missing piece, of data protection protection puzzle. It allows you to keep your data encrypted at all times. While at rest, when in motion through the network, and now, even when it is **in use in memory**. Additionally, by making [Remote Attestion](../../attestation/overview.md) possible, it allows to cryptographically verify that the machine on which you place your data has not undergone tampering or been compromised.
302302

303-
For Infrastructure as a Service (IaaS), you can use [confidential virtual machines powered by AMD SEV-SNP](../../confidential-computing/confidential-vm-overview.md) or [VMs based on Intel Software Guard Extensions (SGX) application enclaves](../../confidential-computing/application-development.md). For Platform as a Service, we have multiple [container compute](../../confidential-computing/choose-confidential-containers-offerings.md) options, including integrations with [Azure Kubernetes Service (AKS)](../../confidential-computing/confidential-nodes-aks-overview.md).
303+
The spectrum of option ranges from enabling "lift and shift" scenarios of existing applications, to a full control of various features of security. For Infrastructure as a Service (IaaS), you can use [confidential virtual machines powered by AMD SEV-SNP](../../confidential-computing/confidential-vm-overview.md) or [VMs based on Intel Software Guard Extensions (SGX) application enclaves](../../confidential-computing/application-development.md). For Platform as a Service, we have multiple [container compute](../../confidential-computing/choose-confidential-containers-offerings.md) options, including integrations with [Azure Kubernetes Service (AKS)](../../confidential-computing/confidential-nodes-aks-overview.md).
304304

305305
### Antimalware & Antivirus
306306
With Azure IaaS, you can use antimalware software from security vendors such as Microsoft, Symantec, Trend Micro, McAfee, and Kaspersky to protect your virtual machines from malicious files, adware, and other threats. [Microsoft Antimalware](antimalware.md) for Azure Cloud Services and Virtual Machines is a protection capability that helps identify and remove viruses, spyware, and other malicious software. Microsoft Antimalware provides configurable alerts when known malicious or unwanted software attempts to install itself or run on your Azure systems. Microsoft Antimalware can also be deployed using Microsoft Defender for Cloud

0 commit comments

Comments
 (0)