Skip to content

Commit 3d60cdd

Browse files
authored
Merge pull request #290917 from ShawnJackson/confidential-computing-solutions
[AQ] edit pass: Articles about confidential computing solutions
2 parents d40b8d1 + 08215f5 commit 3d60cdd

File tree

3 files changed

+110
-89
lines changed

3 files changed

+110
-89
lines changed

articles/confidential-computing/TOC.yml

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,25 @@
33
- name: What is confidential computing? # WHAT?
44
expanded: true
55
items:
6-
- name: Real-time protection of data whilst in-use # what keys are where+protect what #p1
6+
- name: Real-time protection of data in use # what keys are where+protect what #p1
77
href: overview.md # DONE #p1
8-
- name: Use-cases and scenarios
8+
- name: Use cases and scenarios
99
href: use-cases-scenarios.md #DONE, link to the learn page
1010
- name: Confidential computing on Azure #DONE, #existing page - shows the ACC products
1111
href: overview-azure-products.md
12-
- name: Trusted Execution Environment (TEE) #p1
12+
- name: Trusted execution environment (TEE) #p1
1313
href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example
14-
- name: Trusted Compute Base (TCB) #p1 #done
14+
- name: Trusted compute base (TCB) #p1 #done
1515
href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB
16-
- name: Secret & Key Management #p1
16+
- name: Secret & key management #p1
1717
href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed
1818
- name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done
1919
href: attestation-solutions.md
2020
# - name: Hardware attestation vs. software attestation #p1 new, why HW based attestation is better than the rest
2121
# href: hardware-attestation-approach.md
2222
- name: Confidential computing solutions
2323
items:
24-
- name: Azure Confidential Clean Rooms
24+
- name: Azure Confidential Clean Room
2525
href: confidential-clean-rooms.md
2626
- name: Building confidential computing solutions
2727
href: confidential-computing-solutions.md
@@ -87,7 +87,7 @@
8787
href: skr-flow-confidential-containers-azure-container-instance.md
8888
- name: SKR Policy Examples
8989
href: skr-policy-examples.md
90-
- name: Virtual Machines with App Enclaves
90+
- name: Virtual machines with app enclaves
9191
items:
9292
- name: App enclaves overview
9393
href: application-development.md
@@ -127,7 +127,7 @@
127127
href: confidential-containers-on-aks-preview.md
128128
- name: Confidential containers AKS security policy
129129
href: confidential-containers-aks-security-policy.md
130-
- name: Confidential containers with Azure Container Instances (ACI)
130+
- name: Confidential containers with Azure Container Instances
131131
href: confidential-containers.md#vm-isolated-confidential-containers-on-azure-container-instances-aci
132132
- name: Confidential containers with Intel SGX enclaves
133133
href: confidential-containers-enclaves.md
@@ -152,17 +152,17 @@
152152
- name: Confidential services
153153
expanded: true
154154
items:
155-
- name: SQL Always Encrypted with Secure Enclaves # x-link to SQL docs #done
155+
- name: SQL Always Encrypted with secure enclaves # x-link to SQL docs #done
156156
href: /sql/relational-databases/security/encryption/configure-always-encrypted-enclaves
157-
- name: SQL on Confidential Virtual Machines #done
157+
- name: SQL on confidential virtual machines #done
158158
href: /azure/azure-sql/virtual-machines/windows/sql-vm-create-confidential-vm-how-to
159-
- name: Confidential Databricks
159+
- name: Confidential VMs for Azure Databricks
160160
href: https://techcommunity.microsoft.com/t5/azure-confidential-computing/confidential-vm-option-for-azure-databricks-preview/ba-p/3827982#:~:text=Azure%20Databricks%20now%20supports%20using%20Confidential%20computing%20VM,Azure%20Databricks%20workload%20securely%20%26%20confidentially%20on%20Azure
161-
- name: Confidential Azure Data Explorer (PREVIEW) #done
161+
- name: Confidential VMs for Azure Data Explorer (preview) #done
162162
href: https://techcommunity.microsoft.com/t5/azure-data-explorer-blog/confidential-vm-option-for-azure-data-explorer-public-preview/ba-p/3827343
163-
- name: Azure Virtual Desktop (AVD) Confidential Desktop #done #GA
163+
- name: Confidential VMs for Azure Virtual Desktop #done #GA
164164
href: /azure/virtual-desktop/whats-new#confidential-virtual-machines-and-trusted-launch-virtual-machines-are-now-generally-available-in-azure-virtual-desktop
165-
- name: Azure Confidential Ledger #done
165+
- name: Azure confidential ledger #done
166166
href: /azure/confidential-ledger/overview
167167
- name: Partner Solutions
168168
items:
@@ -202,9 +202,9 @@
202202
href: https://confidentialcomputing.io/
203203
- name: Confidential computing feedback
204204
href: https://feedback.azure.com/d365community/
205-
- name: StackOverflow
205+
- name: Stack Overflow
206206
href: https://stackoverflow.com/questions/tagged/azure-confidential-computing
207-
- name: Virtual Machines on Azure
207+
- name: Virtual machines in Azure
208208
href: /azure/virtual-machines/
209209
- name: Security patch status
210210
href: https://microsoft-my.sharepoint.com/:w:/p/irakaul/EbZErJv7pXpJv-DJn6oZtwgBPLeTa12q3sbTZFAGU8BfvQ?e=Rs2RxX

0 commit comments

Comments
 (0)