Confidential computing can be deployed in the public cloud, on-premise data centers, or distributed "edge" locations, including network nodes, branch offices, industrial systems and others.
Data privacy and security Confidential computing protects the
confidentiality and
integrity of data and code from the infrastructure provider, unauthorized or malicious software and system administrators, and other cloud tenants, which may be a concern for organizations seeking control over sensitive or regulated data. The additional security capabilities offered by confidential computing can help accelerate the transition of more sensitive workloads to the cloud or edge locations.
Multi-party analytics Confidential computing can enable multiple parties to engage in joint analysis using confidential or regulated data inside a TEE while preserving privacy and regulatory compliance. In this case, all parties benefit from the shared analysis, but no party's sensitive data or confidential code is exposed to the other parties or system host.
Confidential generative AI Confidential computing technologies can be applied to various stages of a
generative AI deployments to help increase data or model privacy, security, and regulatory compliance. TEEs and
remote attestation can protect the integrity of data during AI model training, keep non-public data confidential during inference or
Retrieval Augmented Generation (RAG), and protect the AI model itself from various adversarial attacks or theft.
Regulatory compliance Confidential computing assists in data protection and regulatory compliance by limiting which software and people may access regulated data, as well as providing greater assurance of data and code integrity. In addition, TEEs can assist with
data governance by providing evidence of steps taken to mitigate risks and demonstrate that these were appropriate. In 2021, the
European Union Agency for Cybersecurity (ENISA) classifies confidential computing as a "State of the Art" technology with respect to protecting data under the European Union's
General Data Protection Regulation and Germany's IT Security Act (ITSiG).
Data localization, sovereignty and residency Regulations regarding
data localization and residency or
data sovereignty may require that sensitive data remain in a specific country or geographic bloc to provide assurance that the data will only be used in compliance with local law. Using confidential computing, only the workload owner holds the
encryption keys required to decrypt data for processing inside a verified TEE. This provides a technological safeguard that reduces the risk of data being exfiltrated and processed in plaintext in other countries or jurisdictions without the workload owner's consent. Additional use cases for confidential computing include
blockchain applications with enhanced record privacy and code integrity, privacy-preserving advertising technology, confidential databases and more. ==Criticism==