You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The threat model aims to reduce or remove the ability for a cloud provider opera
23
23
24
24
:::image type="content" source="media/overview/three-states-and-confidential-computing-consortium-definition.png" alt-text="Diagram of three states of data protection, with confidential computing's data in use highlighted.":::
25
25
26
-
When used with data encryption at rest and in transit, confidential computing extends data protections further to protect data whilst its in use. This is beneficial for organizations seeking further protections for sensitive data and applications hosted in cloud environments.
26
+
When used with data encryption at rest and in transit, confidential computing extends data protections further to protect data whilst it's in use. This is beneficial for organizations seeking further protections for sensitive data and applications hosted in cloud environments.
27
27
28
28
## Lessen the need for trust
29
29
Running workloads on the cloud requires trust. You give this trust to various providers enabling different components of your application.
0 commit comments