Skip to content

Commit 6f4c104

Browse files
committed
fixing broken bookmark
1 parent b30a681 commit 6f4c104

File tree

3 files changed

+7
-6
lines changed

3 files changed

+7
-6
lines changed

articles/confidential-computing/trusted-compute-base.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.date: 06/09/2023
99
ms.custom: template-concept
1010
ms.subservice: confidential-computing
1111
---
12-
# Trusted Computing Base
12+
# Trusted computing base
1313

14-
Trusted Computing Base (TCB) refers to all of a system's hardware, firmware, and software components that provide a secure environment. The components inside the TCB are considered critical. If one component inside the TCB is compromised, the entire system's security might be jeopardized. A lower TCB means higher security. There's less risk of exposure to various vulnerabilities, malware, attacks, and malicious people.
14+
Trusted computing base (TCB) refers to all of a system's hardware, firmware, and software components that provide a secure environment. The components inside the TCB are considered critical. If one component inside the TCB is compromised, the entire system's security might be jeopardized. A lower TCB means higher security. There's less risk of exposure to various vulnerabilities, malware, attacks, and malicious people.
1515

1616
The following diagram shows what's "inside" and "outside" of the TCB. The workload and data that the customer operator manages is inside the TCB. The elements managed by the cloud provider (Azure) are outside of the TCB.
1717

18-
:::image type="content" source="./media/trusted-compute-base/azure-confidential-computing-zero-trust-architecture.jpg" alt-text="Diagram that shows the Trusted Computing Base concept.":::
18+
:::image type="content" source="./media/trusted-compute-base/azure-confidential-computing-zero-trust-architecture.jpg" alt-text="Diagram that shows the trusted computing base concept.":::
1919

2020
## Hardware root of trust
2121

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: overview
99
ms.date: 11/04/2021
1010
ms.author: jushiman
1111
---
12-
# Use cases
12+
# Confidential computing use cases
1313

1414
When you use confidential computing technologies, you can harden your virtualized environment from the host, the hypervisor, the host admin, and even your own virtual machine (VM) admin. Depending on your threat model, you can use various technologies to:
1515

@@ -18,7 +18,7 @@ When you use confidential computing technologies, you can harden your virtualize
1818
- **Ensure secure and untrusted collaboration.** Tackle industrywide work-scale problems by combining data across organizations, even competitors, to unlock broad data analytics and deeper insights.
1919
- **Isolate processing.** Offer a new wave of products that remove liability on private data with blind processing. The service provider can't retrieve user data.
2020

21-
## Scenarios
21+
## Confidential computing scenarios
2222

2323
Confidential computing can apply to various scenarios for protecting data in regulated industries like government, financial services, and healthcare institutes.
2424

articles/event-grid/use-cases.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ ms.date: 02/04/2025
1111
# Customer intent: As an architect or a developer, I want to know what Azure Event Grid is and how it can help me with creating event-driven applications.
1212
---
1313

14-
# Use cases
14+
# Azure Event Grid use cases
15+
1516
This article provides you with a few sample use cases for using Azure Event Grid.
1617

1718
> [!NOTE]

0 commit comments

Comments
 (0)