What is confidential computing?
Explore confidential computing solutions Subscribe to security topic updates
Illustration with collage of pictograms of clouds, mobile phone, fingerprint, check mark
What is confidential computing?

Confidential computing is a cloud computing technology that protects data during processing. Exclusive control of encryption keys delivers stronger end-to-end data security in the cloud.

Confidential computing technology isolates sensitive data in a protected CPU enclave during processing. The contents of the enclave, which include the data being processed and the techniques that are used to process it, are accessible only to authorized programming codes. They are invisible and unknowable to anything or anyone else, including the cloud provider.

As company leaders rely increasingly on public and hybrid cloud services, data privacy in the cloud is imperative. The primary goal of confidential computing is to provide greater assurance to leaders that their data in the cloud is protected and confidential, and to encourage them to move more of their sensitive data and computing workloads to public cloud services.

For years, cloud providers have offered encryption services to help secure data at rest (in storage, databases and data centers) and data in transit (moving over a network connection). Confidential computing eliminates the remaining data security vulnerability by protecting data in use during processing or runtime. Data is protected at every stage of its lifecycle.

KuppingerCole Leadership Compass for Data Security Platforms

The Leadership Compass report provides an overview of the data security platforms market, along with guidance on finding the data protection and governance products that meet clients’ requirements.

Related content

Register for the Cost of a Data Breach report

How confidential computing works

Before it can be processed by an application, data must be unencrypted in memory. This leaves the data vulnerable before, during and after processing to memory dumps, root user compromises and other malicious exploits.

Confidential computing solves this cybersecurity challenge by using a hardware-based trusted execution environment (TEE), which is a secure enclave within a CPU. The TEE is secured using embedded encryption keys; embedded attestation mechanisms ensure that the keys are accessible to authorized application code only. If malware or other unauthorized code attempts to access the keys, or if the authorized code is hacked or altered in any way, the TEE denies access to the keys and cancels the computation.

This way, sensitive data can remain protected in memory until the application tells the TEE to decrypt it for processing. While the data is decrypted throughout the entire computation process, it is invisible to the operating system, the hypervisor in a virtual machine (VM), to other compute stack resources and to the cloud service provider and its employees.

Why use confidential computing?

To protect sensitive data even while in use and to extend cloud computing benefits to sensitive workloads. When used together with data encryption at rest and in transit with exclusive control of keys, confidential computing eliminates the single largest barrier to moving sensitive or highly regulated data sets and application workloads from an inflexible, expensive on-premises computing environment to a more flexible and modern public cloud ecosystem. 

To protect intellectual property. Confidential computing isn't just for data protection. The TEE can also be used to protect proprietary business logic, analytics functions, machine learning algorithms or entire applications.

To collaborate securely with partners on new cloud solutions. For example, one company's team can combine its sensitive data with another company's proprietary calculations to create new solutions while maintaining data confidentiality. Neither company has to share any data or intellectual property that it doesn't want to share.

To eliminate concerns when choosing cloud providers. Confidential computing allows a company leader to choose the cloud computing services that best meet the organization's technical and business requirements, without worrying about storing and processing customer data, proprietary technology and other sensitive assets. This approach also helps alleviate any additional competitive concerns if the cloud provider also provides competing business services.

To protect data processed at the edge. Edge computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. When this framework is used as part of distributed cloud patterns, the data and application at edge nodes can be protected with confidential computing.

The Confidential Computing Consortium

In 2019, a group of CPU manufacturers, cloud providers and software companies—Alibaba, AMD, Baidu, Fortanix, Google, IBM® and Red Hat®, Intel, Microsoft, Oracle, Swisscom, Tencent and VMware—formed the Confidential Computing Consortium1 (CCC) under the auspices of The Linux Foundation.

The CCC's goals are to define industry-wide standards for confidential computing and to promote the development of open source confidential computing tools. Two of the Consortium's first open source projects, Open Enclave SDK and Red Hat Enarx, help developers build applications that run with or without modification across TEE platforms. 

However, some of today's most widely used confidential computing technologies were introduced by member companies before the formation of the Consortium. For example, Intel SGX (Software Guard Extensions) technology, which enables TEEs on Intel Xeon processors, has been available since 2016. IBM has confidential computing capabilities generally available with its IBM Cloud® virtual and bare metal servers.

Related solutions
IBM Cloud® Virtual Server for VPC with Intel® SGX®

Help increase application security and protect selected code and data from modification with Intel® SGX® on hyper-scalable virtual servers inside IBM Cloud VPC–a private network in the public cloud.

Explore IBM Cloud Virtual Server for VPC
IBM Cloud Hyper Protect Crypto Services

Provide complete control of cloud data encryption keys and FIPS 140-2 Level 4 certified cloud hardware security modules (HSM) with the industry's only Keep Your Own Key (KYOK) for data encryption at rest.

Explore IBM Cloud Hyper Protect Crypto Services
IBM Cloud Hyper Protect Virtual Servers for VPC

Deploy containerized mission-critical workloads on cloud in a trusted execution environment with technical assurance.

Explore IBM Cloud Hyper Protect Virtual Servers for VPC
IBM Hyper Protect Virtual Servers for IBM Z® and LinuxONE

Securely build, deploy and manage mission-critical applications for hybrid cloud implementations on IBM Z and LinuxONE by leveraging the IBM Secure Execution for Linux technology.

Explore IBM Hyper Protect Virtual Servers for IBM Z® and LinuxONE
Data and AI security services  

Comprehensive and critical protection for enterprise data, applications and AI.

Explore data and AI security services
Resources Cost of a Data Breach report

Get the latest insights into the expanding threat landscape and obtain recommendations for how to save time and limit losses.

What is data security?

Learn how data security involves protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle.

X-Force Threat Intelligence Index

Chief information security officers (CISOs), security teams and business leaders: Find actionable insights for understanding how threat actors are waging attacks and how to proactively protect your organization.

Take the next step

Confidential computing with IBM Cloud® includes a range of services from the Hyper Protect Services and Intel® Xeon®-based IBM Cloud Virtual Servers portfolio to deploy containerized, mission-critical workloads in isolated enclaves with exclusive key control, helping to ensure data confidentiality and code integrity.

Explore confidential computing solutions
Footnotes

Confidential Computing Consortium (link resides outside ibm.com), The Linux Foundation