Skip to content

Commit b54db5a

Browse files
Merge pull request #273520 from michamcr/patch-102
Update use-cases-scenarios.md
2 parents 3db8f01 + 0b6a182 commit b54db5a

File tree

1 file changed

+16
-3
lines changed

1 file changed

+16
-3
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,25 @@ ms.topic: overview
99
ms.date: 11/04/2021
1010
ms.author: jushiman
1111
---
12-
# Use cases and scenarios
13-
Confidential computing applies to various use cases for protecting data in regulated industries such as government, financial services, and healthcare institutes. For example, preventing access to sensitive data helps protect the digital identity of citizens from all parties involved, including the cloud provider that stores it. The same sensitive data may contain biometric data that is used for finding and removing known images of child exploitation, preventing human trafficking, and aiding digital forensics investigations.
12+
# Usecases
13+
14+
Using confidential computing technologies, you can harden your virtualized environment from the host, the hypervisor, the host admin, and even your own VM admin. Depending on your threat model, we offer various technologies that enable you to:
15+
16+
- **Prevent unauthorized access**: Run sensitive data in the cloud. Trust that Azure provides the best data protection possible, with little to no change from what gets done today.
17+
18+
- **Meet regulatory compliance**: Migrate to the cloud and keep full control of data to satisfy government regulations for protecting personal information and secure organizational IP.
19+
20+
- **Ensure secure and untrusted collaboration**: Tackle industry-wide work-scale problems by combing data across organizations, even competitors, to unlock broad data analytics and deeper insights.
21+
22+
- **Isolate processing**: Offer a new wave of products that remove liability on private data with blind processing. User data can't even be retrieved by the service provider.
23+
24+
## Scenarios
25+
26+
Confidential computing can apply to various scenarios for protecting data in regulated industries such as government, financial services, and healthcare institutes. For example, preventing access to sensitive data helps protect the digital identity of citizens from all parties involved, including the cloud provider that stores it. The same sensitive data may contain biometric data that is used for finding and removing known images of child exploitation, preventing human trafficking, and aiding digital forensics investigations.
1427

1528
![Screenshot of use cases for Azure confidential computing, including government, financial services, and health care scenarios.](media/use-cases-scenarios/use-cases.png)
1629

17-
This article provides an overview of several common scenarios for Azure confidential computing. The recommendations in this article serve as a starting point as you develop your application using confidential computing services and frameworks.
30+
This article provides an overview of several common scenarios. The recommendations in this article serve as a starting point as you develop your application using confidential computing services and frameworks.
1831

1932
After reading this article, you'll be able to answer the following questions:
2033

0 commit comments

Comments
 (0)