Confidential computing is a security approach that protects data while it is being used. Data is commonly protected when it is stored, and it can also be protected when it travels across a network. Confidential computing focuses on the moment in between: when data is loaded into memory and processed by software.

1. Why it matters

Many organizations process sensitive information in the cloud or on shared systems. Confidential computing reduces the risk that another layer of the system, such as the operating system, a hypervisor, or cloud infrastructure, can view or tamper with that data.

2. How it works

It usually works by using a trusted execution environment, sometimes called a secure enclave. This is an isolated area created with hardware support. Code and data inside that protected area are separated from other software on the same machine, including parts of the operating system or cloud infrastructure.

3. Where it is used

Confidential computing is used for workloads that handle sensitive or regulated data, such as medical records, financial data, identity information, and confidential business logic, while still using the flexibility of modern cloud platforms.

Confidential computing is not a replacement for encryption, access control, or Zero Trust Security. It is one more layer. The system still needs secure software, good key management, monitoring, and careful design.