Skip to content

Commit 8f28cbe

Browse files
committed
edit pass: confidential-computing-solutions
1 parent 5bf7442 commit 8f28cbe

File tree

2 files changed

+18
-18
lines changed

2 files changed

+18
-18
lines changed

articles/confidential-computing/TOC.yml

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,25 @@
33
- name: What is confidential computing? # WHAT?
44
expanded: true
55
items:
6-
- name: Real-time protection of data whilst in-use # what keys are where+protect what #p1
6+
- name: Real-time protection of data in use # what keys are where+protect what #p1
77
href: overview.md # DONE #p1
8-
- name: Use-cases and scenarios
8+
- name: Use cases and scenarios
99
href: use-cases-scenarios.md #DONE, link to the learn page
1010
- name: Confidential computing on Azure #DONE, #existing page - shows the ACC products
1111
href: overview-azure-products.md
12-
- name: Trusted Execution Environment (TEE) #p1
12+
- name: Trusted execution environment (TEE) #p1
1313
href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example
14-
- name: Trusted Compute Base (TCB) #p1 #done
14+
- name: Trusted compute base (TCB) #p1 #done
1515
href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB
16-
- name: Secret & Key Management #p1
16+
- name: Secret & key management #p1
1717
href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed
1818
- name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done
1919
href: attestation-solutions.md
2020
# - name: Hardware attestation vs. software attestation #p1 new, why HW based attestation is better than the rest
2121
# href: hardware-attestation-approach.md
2222
- name: Confidential computing solutions
2323
items:
24-
- name: Azure Confidential Clean Rooms
24+
- name: Azure Confidential Clean Room
2525
href: confidential-clean-rooms.md
2626
- name: Building confidential computing solutions
2727
href: confidential-computing-solutions.md
@@ -87,7 +87,7 @@
8787
href: skr-flow-confidential-containers-azure-container-instance.md
8888
- name: SKR Policy Examples
8989
href: skr-policy-examples.md
90-
- name: Virtual Machines with App Enclaves
90+
- name: Virtual machines with app enclaves
9191
items:
9292
- name: App enclaves overview
9393
href: application-development.md
@@ -127,7 +127,7 @@
127127
href: confidential-containers-on-aks-preview.md
128128
- name: Confidential containers AKS security policy
129129
href: confidential-containers-aks-security-policy.md
130-
- name: Confidential containers with Azure Container Instances (ACI)
130+
- name: Confidential containers with Azure Container Instances
131131
href: confidential-containers.md#vm-isolated-confidential-containers-on-azure-container-instances-aci
132132
- name: Confidential containers with Intel SGX enclaves
133133
href: confidential-containers-enclaves.md
@@ -152,17 +152,17 @@
152152
- name: Confidential services
153153
expanded: true
154154
items:
155-
- name: SQL Always Encrypted with Secure Enclaves # x-link to SQL docs #done
155+
- name: SQL Always Encrypted with secure enclaves # x-link to SQL docs #done
156156
href: /sql/relational-databases/security/encryption/configure-always-encrypted-enclaves
157-
- name: SQL on Confidential Virtual Machines #done
157+
- name: SQL on confidential virtual machines #done
158158
href: /azure/azure-sql/virtual-machines/windows/sql-vm-create-confidential-vm-how-to
159-
- name: Confidential Databricks
159+
- name: Confidential VMs for Azure Databricks
160160
href: https://techcommunity.microsoft.com/t5/azure-confidential-computing/confidential-vm-option-for-azure-databricks-preview/ba-p/3827982#:~:text=Azure%20Databricks%20now%20supports%20using%20Confidential%20computing%20VM,Azure%20Databricks%20workload%20securely%20%26%20confidentially%20on%20Azure
161-
- name: Confidential Azure Data Explorer (PREVIEW) #done
161+
- name: Confidential VMs for Azure Data Explorer (preview) #done
162162
href: https://techcommunity.microsoft.com/t5/azure-data-explorer-blog/confidential-vm-option-for-azure-data-explorer-public-preview/ba-p/3827343
163-
- name: Azure Virtual Desktop (AVD) Confidential Desktop #done #GA
163+
- name: Confidential VMs for Azure Virtual Desktop #done #GA
164164
href: /azure/virtual-desktop/whats-new#confidential-virtual-machines-and-trusted-launch-virtual-machines-are-now-generally-available-in-azure-virtual-desktop
165-
- name: Azure Confidential Ledger #done
165+
- name: Azure confidential ledger #done
166166
href: /azure/confidential-ledger/overview
167167
- name: Partner Solutions
168168
items:
@@ -202,9 +202,9 @@
202202
href: https://confidentialcomputing.io/
203203
- name: Confidential computing feedback
204204
href: https://feedback.azure.com/d365community/
205-
- name: StackOverflow
205+
- name: Stack Overflow
206206
href: https://stackoverflow.com/questions/tagged/azure-confidential-computing
207-
- name: Virtual Machines on Azure
207+
- name: Virtual machines in Azure
208208
href: /azure/virtual-machines/
209209
- name: Security patch status
210210
href: https://microsoft-my.sharepoint.com/:w:/p/irakaul/EbZErJv7pXpJv-DJn6oZtwgBPLeTa12q3sbTZFAGU8BfvQ?e=Rs2RxX

articles/confidential-computing/confidential-computing-deployment-models.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ Under the infrastructure as a service (IaaS) deployment model in cloud computing
2020
- *Confidential virtual machines (VMs)* based on [AMD SEV-SNP](confidential-vm-overview.md) or [Intel TDX](tdx-confidential-vm-overview.md) for VM isolation
2121
- *Application enclaves* with [Intel SGX](confidential-computing-enclaves.md) for app isolation
2222

23-
These options provide organizations with differing deployment models depending their trust boundary or desired ease of deployment.
23+
These options provide organizations with differing deployment models, depending on their trust boundary or desired ease of deployment.
2424

2525
![Diagram that shows the customer trust boundary of confidential computing technologies.](./media/confidential-computing-deployment-models/cloud-trust-boundary.png)
2626

2727
The IaaS deployment model grants access to scalable computing resources (such as servers, storage, networking, and virtualization) on demand. By adopting an IaaS deployment model, organizations can forgo the process of procuring, configuring, and managing their own infrastructure. Instead, they pay for only the resources that they use. This ability makes IaaS a cost-effective solution.
2828

2929
In the domain of cloud computing, the IaaS deployment model enables businesses to rent individual services from cloud service providers like Azure. Azure assumes responsibility for managing and maintaining the infrastructure so that organizations can concentrate on installing, configuring, and managing their software. Azure also offers supplementary services such as comprehensive billing management, logging, monitoring, storage resiliency, and security.
3030

31-
Scalability is another advantage of the IaaS deployment model in cloud computing. Enterprises can swiftly scale their resources up and down according to their requirements. This flexibility facilitates faster development life cycles, accelerating time to market for new products and ideas. The IaaS deployment model also helps ensure reliability by eliminating single points of failure. Even in the event of a hardware component failure, the service remains available.
31+
Scalability is another advantage of the IaaS deployment model in cloud computing. Enterprises can swiftly scale their resources up and down according to their requirements. This flexibility facilitates faster development life cycles, accelerating time to market for new products and ideas. The IaaS deployment model also helps ensure reliability by eliminating single points of failure. Even if a hardware component fails, the service remains available.
3232

3333
In summary, the IaaS deployment model in combination with Azure confidential computing offers benefits like cost savings, increased efficiency, innovation opportunities, reliability, and high scalability. It takes advantage of a robust and comprehensive security solution that's designed to protect highly sensitive data.
3434

0 commit comments

Comments
 (0)