Skip to content

Commit 28fbc35

Browse files
committed
Address PR review issues
1 parent 0f0bd3c commit 28fbc35

File tree

10 files changed

+9
-13
lines changed

10 files changed

+9
-13
lines changed

articles/confidential-computing/confidential-computing-deployment-models.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: virtual-machines
66
ms.subservice: confidential-computing
77
ms.workload: infrastructure
88
ms.topic: conceptual
9-
ms.date: 11/03/2021
9+
ms.date: 11/04/2021
1010
ms.author: JenCook
1111
ms.custom: ignite-fall-2021
1212
---
@@ -39,7 +39,7 @@ Containers also increase portability of applications, and improve resource usage
3939
Normally, you might deploy your solution on confidential VMs if:
4040

4141
- You've got legacy applications that cannot be modified or containerized. However, you still need to introduce protection of data in memory, while the data is being processed.
42-
- You're running multiple applications requiring different operating systems (OSes) on a single piece of infrastructure.
42+
- You're running multiple applications requiring different operating systems (OS) on a single piece of infrastructure.
4343
- You want to emulate an entire computing environment, including all OS resources.
4444
- You're migrating your existing VMs from on-premises to Azure.
4545

articles/confidential-computing/confidential-containers.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about unmodified container support with confidential containe
44
services: container-service
55
author: agowdamsft
66
ms.topic: article
7-
ms.date: 11/03/2011
7+
ms.date: 11/04/2021
88
ms.author: amgowda
99
ms.service: container-service
1010
ms.custom: ignite-fall-2021
@@ -18,8 +18,6 @@ A hardware-based Trusted Execution Environment (TEE) provides strong assurances.
1818

1919
Confidential containers support custom applications developed with any programming languages. You can also run Docker container apps off the shelf.
2020

21-
![Diagram of confidential container protection boundary in Kubernetes.]()
22-
2321
:::image type="content" source="./media/confidential-containers/sgx-confidential-container.png" alt-text="Diagram of confidential container protection boundary in Kubernetes, showing no access for admins.":::
2422

2523
## Enablers with Intel SGX on Azure Kubernetes Service(AKS)

articles/confidential-computing/confidential-nodes-aks-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: agowdamsft
66
ms.service: container-service
77
ms.subservice: confidential-computing
88
ms.topic: overview
9-
ms.date: 11/03/2021
9+
ms.date: 11/04/2021
1010
ms.author: amgowda
1111
ms.custom: ignite-fall-2021
1212
---
@@ -19,7 +19,7 @@ ms.custom: ignite-fall-2021
1919

2020
Azure Kubernetes Service (AKS) supports adding [DCsv2 confidential computing nodes](confidential-computing-enclaves.md) powered by Intel SGX. These nodes allow you to run sensitive workloads within a hardware-based trusted execution environment (TEE). TEE’s allow user-level code from containers to allocate private regions of memory to execute the code with CPU directly. These private memory regions that execute directly with CPU are called enclaves. Enclaves help protect the data confidentiality, data integrity and code integrity from other processes running on the same nodes. The Intel SGX execution model also removes the intermediate layers of Guest OS, Host OS and Hypervisor thus reducing the attack surface area. The *hardware based per container isolated execution* model in a node allows applications to directly execute with the CPU, while keeping the special block of memory encrypted per container. Confidential computing nodes with confidential containers are a great addition to your zero trust security planning and defense-in-depth container strategy.
2121

22-
:::image type="content" source="./media/confidential-nodes-aks-overview/sgxaksnode.png" alt-text="Graphic of AKS Confidential Compute Node, showing confidential containers with code and data secured inside.":::
22+
:::image type="content" source="./media/confidential-nodes-aks-overview/sgx-aks-node.png" alt-text="Graphic of AKS Confidential Compute Node, showing confidential containers with code and data secured inside.":::
2323

2424
## AKS Confidential Nodes Features
2525

-48.3 KB
Loading
Binary file not shown.

articles/confidential-computing/overview-azure-products.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: virtual-machines
66
ms.subservice: confidential-computing
77
ms.workload: infrastructure
88
ms.topic: overview
9-
ms.date: 11/03/2021
9+
ms.date: 11/04/2021
1010
ms.author: JenCook
1111
ms.custom: ignite-fall-2021
1212
---
@@ -25,8 +25,6 @@ When used with data encryption at rest and in transit, confidential computing el
2525

2626
[Microsoft's offerings](https://aka.ms/azurecc) for confidential computing extend from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) and as well as developer tools to support your journey to data and code confidentiality in the cloud.
2727

28-
:::image type="content" source="media/overview-azure-products/acc-stack.png" alt-text="Screenshot of the Azure confidential computing stack, showing tools and services.":::
29-
3028
## Reducing the attack surface
3129
The trusted computing base (TCB) refers to all of a system's hardware, firmware, and software components that provide a secure environment. The components inside the TCB are considered "critical". If one component inside the TCB is compromised, the entire system's security may be jeopardized. A lower TCB means higher security. There's less risk of exposure to various vulnerabilities, malware, attacks, and malicious people. Azure confidential computing aims to lower the TCB for your cloud workloads by offering TEEs.
3230

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ author: JBCook
66
ms.service: virtual-machines
77
ms.subservice: confidential-computing
88
ms.topic: overview
9-
ms.date: 11/03/2021
9+
ms.date: 11/04/2021
1010
ms.author: jencook
1111
ms.custom: ignite-fall-2021
1212
---
1313
# Use cases and scenarios
1414
Confidential computing applies to various use cases for protecting data in regulated industries such as government, financial services, and healthcare institutes. For example, preventing access to sensitive data helps protect the digital identity of citizens from all parties involved, including the cloud provider that stores it. The same sensitive data may contain biometric data that is used for finding and removing known images of child exploitation, preventing human trafficking, and aiding digital forensics investigations.
1515

16-
:::image type="content" source="media/use-cases-scenarios/use_cases.png" alt-text="Screenshot of use cases for Azure confidential computing, including government, financial services, and health care scenarios.":::
16+
:::image type="content" source="media/use-cases-scenarios/use-cases.png" alt-text="Screenshot of use cases for Azure confidential computing, including government, financial services, and health care scenarios.":::
1717

1818
This article provides an overview of several common scenarios for Azure confidential computing. The recommendations in this article serve as a starting point as you develop your application using confidential computing services and frameworks.
1919

@@ -51,7 +51,7 @@ In this secure multi-party computation example, multiple banks share data with e
5151

5252
Through confidential computing, these financial institutions can increase fraud detection rates, address money laundering scenarios, reduce false positives, and continue learning from larger data sets.
5353

54-
:::image type="content" source="media/use-cases-scenarios/mpc_banks.png" alt-text="Graphic of multiparty data sharing for banks, showing the data movement that confidential computing enables.":::
54+
:::image type="content" source="media/use-cases-scenarios/mpc-banks.png" alt-text="Graphic of multiparty data sharing for banks, showing the data movement that confidential computing enables.":::
5555

5656
### Drug development in healthcare
5757

0 commit comments

Comments
 (0)