|
3 | 3 | - name: What is confidential computing? # WHAT?
|
4 | 4 | expanded: true
|
5 | 5 | items:
|
6 |
| - - name: Real-time protection of data whilst in-use # what keys are where+protect what #p1 |
| 6 | + - name: Real-time protection of data in use # what keys are where+protect what #p1 |
7 | 7 | href: overview.md # DONE #p1
|
8 |
| - - name: Use-cases and scenarios |
| 8 | + - name: Use cases and scenarios |
9 | 9 | href: use-cases-scenarios.md #DONE, link to the learn page
|
10 | 10 | - name: Confidential computing on Azure #DONE, #existing page - shows the ACC products
|
11 | 11 | href: overview-azure-products.md
|
12 |
| - - name: Trusted Execution Environment (TEE) #p1 |
| 12 | + - name: Trusted execution environment (TEE) #p1 |
13 | 13 | href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example
|
14 |
| - - name: Trusted Compute Base (TCB) #p1 #done |
| 14 | + - name: Trusted compute base (TCB) #p1 #done |
15 | 15 | href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB
|
16 |
| - - name: Secret & Key Management #p1 |
| 16 | + - name: Secret & key management #p1 |
17 | 17 | href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed
|
18 | 18 | - name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done
|
19 | 19 | href: attestation-solutions.md
|
20 | 20 | # - name: Hardware attestation vs. software attestation #p1 new, why HW based attestation is better than the rest
|
21 | 21 | # href: hardware-attestation-approach.md
|
22 | 22 | - name: Confidential computing solutions
|
23 | 23 | items:
|
24 |
| - - name: Azure Confidential Clean Rooms |
| 24 | + - name: Azure Confidential Clean Room |
25 | 25 | href: confidential-clean-rooms.md
|
26 | 26 | - name: Building confidential computing solutions
|
27 | 27 | href: confidential-computing-solutions.md
|
|
87 | 87 | href: skr-flow-confidential-containers-azure-container-instance.md
|
88 | 88 | - name: SKR Policy Examples
|
89 | 89 | href: skr-policy-examples.md
|
90 |
| - - name: Virtual Machines with App Enclaves |
| 90 | + - name: Virtual machines with app enclaves |
91 | 91 | items:
|
92 | 92 | - name: App enclaves overview
|
93 | 93 | href: application-development.md
|
|
127 | 127 | href: confidential-containers-on-aks-preview.md
|
128 | 128 | - name: Confidential containers AKS security policy
|
129 | 129 | href: confidential-containers-aks-security-policy.md
|
130 |
| - - name: Confidential containers with Azure Container Instances (ACI) |
| 130 | + - name: Confidential containers with Azure Container Instances |
131 | 131 | href: confidential-containers.md#vm-isolated-confidential-containers-on-azure-container-instances-aci
|
132 | 132 | - name: Confidential containers with Intel SGX enclaves
|
133 | 133 | href: confidential-containers-enclaves.md
|
|
152 | 152 | - name: Confidential services
|
153 | 153 | expanded: true
|
154 | 154 | items:
|
155 |
| - - name: SQL Always Encrypted with Secure Enclaves # x-link to SQL docs #done |
| 155 | + - name: SQL Always Encrypted with secure enclaves # x-link to SQL docs #done |
156 | 156 | href: /sql/relational-databases/security/encryption/configure-always-encrypted-enclaves
|
157 |
| - - name: SQL on Confidential Virtual Machines #done |
| 157 | + - name: SQL on confidential virtual machines #done |
158 | 158 | href: /azure/azure-sql/virtual-machines/windows/sql-vm-create-confidential-vm-how-to
|
159 |
| - - name: Confidential Databricks |
| 159 | + - name: Confidential VMs for Azure Databricks |
160 | 160 | href: https://techcommunity.microsoft.com/t5/azure-confidential-computing/confidential-vm-option-for-azure-databricks-preview/ba-p/3827982#:~:text=Azure%20Databricks%20now%20supports%20using%20Confidential%20computing%20VM,Azure%20Databricks%20workload%20securely%20%26%20confidentially%20on%20Azure
|
161 |
| - - name: Confidential Azure Data Explorer (PREVIEW) #done |
| 161 | + - name: Confidential VMs for Azure Data Explorer (preview) #done |
162 | 162 | href: https://techcommunity.microsoft.com/t5/azure-data-explorer-blog/confidential-vm-option-for-azure-data-explorer-public-preview/ba-p/3827343
|
163 |
| - - name: Azure Virtual Desktop (AVD) Confidential Desktop #done #GA |
| 163 | + - name: Confidential VMs for Azure Virtual Desktop #done #GA |
164 | 164 | href: /azure/virtual-desktop/whats-new#confidential-virtual-machines-and-trusted-launch-virtual-machines-are-now-generally-available-in-azure-virtual-desktop
|
165 |
| - - name: Azure Confidential Ledger #done |
| 165 | + - name: Azure confidential ledger #done |
166 | 166 | href: /azure/confidential-ledger/overview
|
167 | 167 | - name: Partner Solutions
|
168 | 168 | items:
|
|
202 | 202 | href: https://confidentialcomputing.io/
|
203 | 203 | - name: Confidential computing feedback
|
204 | 204 | href: https://feedback.azure.com/d365community/
|
205 |
| - - name: StackOverflow |
| 205 | + - name: Stack Overflow |
206 | 206 | href: https://stackoverflow.com/questions/tagged/azure-confidential-computing
|
207 |
| - - name: Virtual Machines on Azure |
| 207 | + - name: Virtual machines in Azure |
208 | 208 | href: /azure/virtual-machines/
|
209 | 209 | - name: Security patch status
|
210 | 210 | href: https://microsoft-my.sharepoint.com/:w:/p/irakaul/EbZErJv7pXpJv-DJn6oZtwgBPLeTa12q3sbTZFAGU8BfvQ?e=Rs2RxX
|
0 commit comments