Skip to content

Commit f9fb4b1

Browse files
Merge pull request #287745 from mattmcinnes/abandoned-fixes
Adding abandoned articles to Confidential Computing TOC
2 parents 60ab6ce + 2917db0 commit f9fb4b1

File tree

1 file changed

+26
-16
lines changed
  • articles/confidential-computing

1 file changed

+26
-16
lines changed

articles/confidential-computing/TOC.yml

Lines changed: 26 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,24 +3,28 @@
33
- name: What is confidential computing? # WHAT?
44
expanded: true
55
items:
6-
- name: Real-time protection of data whilst in-use # what keys are where+protect what #p1
7-
href: overview.md # DONE #p1
8-
- name: Use-cases and scenarios
9-
href: use-cases-scenarios.md #DONE, link to the learn page
10-
- name: Confidential computing on Azure #DONE, #existing page - shows the ACC products
11-
href: overview-azure-products.md
12-
- name: Trusted Execution Environment (TEE) #p1
13-
href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example
14-
- name: Trusted Compute Base (TCB) #p1 #done
15-
href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB
16-
- name: Secret & Key Management #p1
17-
href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed
18-
- name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done
19-
href: attestation-solutions.md
6+
- name: Real-time protection of data whilst in-use # what keys are where+protect what #p1
7+
href: overview.md # DONE #p1
8+
- name: Use-cases and scenarios
9+
href: use-cases-scenarios.md #DONE, link to the learn page
10+
- name: Confidential computing on Azure #DONE, #existing page - shows the ACC products
11+
href: overview-azure-products.md
12+
- name: Trusted Execution Environment (TEE) #p1
13+
href: trusted-execution-environment.md # new, an easy to understandding of what a TEE is - explain like the black box example
14+
- name: Trusted Compute Base (TCB) #p1 #done
15+
href: trusted-compute-base.md #an easy to understandding of what a TCB is - what it means to be in/out of the TCB
16+
- name: Secret & Key Management #p1
17+
href: secret-key-management.md # details on AKV and mHSM, and how they're used in the context of Confidential Computing #stubbed
18+
- name: Attestation #p1 #done # EXISTING, use updated page - explain what attestation is, and why it's important, and give some practical examples of where its used #done
19+
href: attestation-solutions.md
2020
# - name: Hardware attestation vs. software attestation #p1 new, why HW based attestation is better than the rest
2121
# href: hardware-attestation-approach.md
22-
- name: Deploying solutions on confidential computing #moved from original #done
23-
href: confidential-computing-deployment-models.md
22+
- name: Confidential computing solutions
23+
items:
24+
- name: Building confidential computing solutions
25+
href: confidential-computing-solutions.md
26+
- name: Deploying solutions on confidential computing #moved from original #done
27+
href: confidential-computing-deployment-models.md
2428
- name: Why might I need it? # WHY?
2529
expanded: true
2630
items:
@@ -57,6 +61,12 @@
5761
href: how-to-leverage-virtual-tpms-in-azure-confidential-vms.md
5862
- name: Create a custom image for a confidential VM
5963
href: how-to-create-custom-image-confidential-vm.md
64+
- name: Quickly create confidential VMs
65+
items:
66+
- name: Create VM through the Azure portal
67+
href: quick-create-portal.md
68+
- name: Create VM through the Azure Marketplace
69+
href: quick-create-marketplace.md
6070
- name: Image hardening techniques for deployment
6171
items:
6272
- name: Harden a Linux image to remove sudo users

0 commit comments

Comments
 (0)