|
3 | 3 | - name: What is confidential computing? # WHAT?
|
4 | 4 | expanded: true
|
5 | 5 | items:
|
6 |
| - - name: Real-time protection of data whilst in-use # what keys are where+protect what #p1 |
7 |
| - href: overview.md # DONE #p1 |
8 |
| - - name: Use-cases and scenarios |
9 |
| - href: use-cases-scenarios.md #DONE, link to the learn page |
10 |
| - - name: Confidential computing on Azure #DONE, #existing page - shows the ACC products |
11 |
| - href: overview-azure-products.md |
12 |
| - - name: Trusted Execution Environment (TEE) #p1 |
13 |
| - href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example |
14 |
| - - name: Trusted Compute Base (TCB) #p1 #done |
15 |
| - href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB |
16 |
| - - name: Secret & Key Management #p1 |
17 |
| - href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed |
18 |
| - - name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done |
19 |
| - href: attestation-solutions.md |
| 6 | + - name: Real-time protection of data whilst in-use # what keys are where+protect what #p1 |
| 7 | + href: overview.md # DONE #p1 |
| 8 | + - name: Use-cases and scenarios |
| 9 | + href: use-cases-scenarios.md #DONE, link to the learn page |
| 10 | + - name: Confidential computing on Azure #DONE, #existing page - shows the ACC products |
| 11 | + href: overview-azure-products.md |
| 12 | + - name: Trusted Execution Environment (TEE) #p1 |
| 13 | + href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example |
| 14 | + - name: Trusted Compute Base (TCB) #p1 #done |
| 15 | + href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB |
| 16 | + - name: Secret & Key Management #p1 |
| 17 | + href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed |
| 18 | + - name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done |
| 19 | + href: attestation-solutions.md |
20 | 20 | # - name: Hardware attestation vs. software attestation #p1 new, why HW based attestation is better than the rest
|
21 | 21 | # href: hardware-attestation-approach.md
|
22 |
| - - name: Deploying solutions on confidential computing #moved from original #done |
23 |
| - href: confidential-computing-deployment-models.md |
| 22 | + - name: Confidential computing solutions |
| 23 | + items: |
| 24 | + - name: Building confidential computing solutions |
| 25 | + href: confidential-computing-solutions.md |
| 26 | + - name: Deploying solutions on confidential computing #moved from original #done |
| 27 | + href: confidential-computing-deployment-models.md |
24 | 28 | - name: Why might I need it? # WHY?
|
25 | 29 | expanded: true
|
26 | 30 | items:
|
|
57 | 61 | href: how-to-leverage-virtual-tpms-in-azure-confidential-vms.md
|
58 | 62 | - name: Create a custom image for a confidential VM
|
59 | 63 | href: how-to-create-custom-image-confidential-vm.md
|
| 64 | + - name: Quickly create confidential VMs |
| 65 | + items: |
| 66 | + - name: Create VM through the Azure portal |
| 67 | + href: quick-create-portal.md |
| 68 | + - name: Create VM through the Azure Marketplace |
| 69 | + href: quick-create-marketplace.md |
60 | 70 | - name: Image hardening techniques for deployment
|
61 | 71 | items:
|
62 | 72 | - name: Harden a Linux image to remove sudo users
|
|
0 commit comments