Skip to content

Commit f202d42

Browse files
authored
pencil edit
1 parent cd1b170 commit f202d42

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/confidential-computing/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The threat model aims to reduce or remove the ability for a cloud provider opera
2323

2424
:::image type="content" source="media/overview/three-states-and-confidential-computing-consortium-definition.png" alt-text="Diagram of three states of data protection, with confidential computing's data in use highlighted.":::
2525

26-
When used with data encryption at rest and in transit, confidential computing extends data protections further to protect data whilst its in use. This is beneficial for organizations seeking further protections for sensitive data and applications hosted in cloud environments.
26+
When used with data encryption at rest and in transit, confidential computing extends data protections further to protect data whilst it's in use. This is beneficial for organizations seeking further protections for sensitive data and applications hosted in cloud environments.
2727

2828
## Lessen the need for trust
2929
Running workloads on the cloud requires trust. You give this trust to various providers enabling different components of your application.

0 commit comments

Comments
 (0)