You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Confidential computing refers to the protection of data while it is being processed. In other words, it aims to keep sensitive data secure from unauthorized access, even when it is being used by programs running on the same physical or virtual machine. This is done by encrypting the data while it is being processed, so that it is only accessible to authorized parties with the proper decryption key. Confidential computing can be used to protect data in various scenarios, such as in the cloud, on-premises, or in hybrid environments.
Confidential computing can be break down to several areas, this Epic is a tracker for all the areas involved to keep track of the integration state in Kairos.
Confidential computing refers to the protection of data while it is being processed. In other words, it aims to keep sensitive data secure from unauthorized access, even when it is being used by programs running on the same physical or virtual machine. This is done by encrypting the data while it is being processed, so that it is only accessible to authorized parties with the proper decryption key. Confidential computing can be used to protect data in various scenarios, such as in the cloud, on-premises, or in hybrid environments.
Confidential computing can be break down to several areas, this Epic is a tracker for all the areas involved to keep track of the integration state in Kairos.
Depends on #347
⛓️ Supply chain security:
grype
for scanning SBOM and images #1056🏗️ Workload isolation:
enclave-cc
on Kairos #1114Generic:
The text was updated successfully, but these errors were encountered: