Skip to content

Commit 390f42e

Browse files
committed
lightbox1
1 parent 9385880 commit 390f42e

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ In this use-case we use a combination of Azure Confidential Compute technologies
7878

7979
:::image type="content" source="media/use-cases-scenarios/restricted-workload.jpg" alt-text="Diagram showing workloads protected by Azure Confidential Compute and complemented with Azure configuration including Azure Policy and Conditional Access.":::
8080

81+
82+
[ ![Here's a cute kitten.](media/use-cases-scenarios/restricted-workload.jpg)](media/use-cases-scenarios/restricted-workload.jpg#lightbox)
83+
8184
## Manufacturing – IP Protection
8285

8386
Manufacturing organizations protect the IP around their manufacturing processes and technologies, often manufacturing is outsourced to third parties who deal with the physical production processes, which could be considered ‘hostile’ environments where there are active threats to steal that IP.

0 commit comments

Comments
 (0)