& cplSiteName &

Microsoft Azure 'Confidential Computing' Secures Data In Use

Mitch Wagner
9/15/2017
50%
50%

Microsoft is launching a preview of new security technology that protects data when it is most at risk -- when it's being used.

"This means that data can be processed in the cloud with the assurance that it is always under customer control," Mark Russinovich, Microsoft Azure chief technology officer, says in a Thursday blog post announcing the technology, which the company calls "Azure confidential computing." Microsoft and Intel have been working together on the technology over the past four years, Russinovich says.

Using Azure confidential computing, data is protected from malicious insiders, hackers and malware, and third parties accessing the data without consent, Russinovich says. The technology protects data from Microsoft itself, as well as government warrants and hackers, according to Ars Technica.


Keep up with the latest enterprise cloud news and insights. Sign up for the weekly Enterprise Cloud News newsletter.


Azure confidential computing protects data that's stored "in the clear," which is required for efficient processing, Russinovich says. The service stores data in a Trusted Execution Environment (TEE), also known as an "enclave." The data is accessible only from authorized code, and if the code is altered or tampered with operations are denied and the environment is disabled, Russinovich says.

Initial support is available both in software and hardware. The software implementation is on Windows 10 and Windows Server 2016, through a TEE implemented in Hyper-V.

The hardware implementation uses Intel SGX TEE with the first SGX-capable server in the public cloud, which can run independently of Azure and Microsoft.

Microsoft will continue to work with Intel and other hardware and software partners on additional TEE implementations, Russinovich says.

Microsoft already uses enclaves to protect blockchain financial operations, data stored in SQL Server and its own infrastructure within Azure, Russinovich says.

It's the same technology used in the Coco Framework for enterprise blockchain, introduced last month. (See Microsoft Serves Coco-Flavored Blockchain for Enterprise.)

Azure confidential computing will be useful in implementations including finance, healthcare, artificial intelligence and more, Russinovich says.

Users and developers can try out Azure confidential computing by signing up on theEarly Access program.

Google launched a security chip called Titan last month, to ensure that servers boot from known good state, with verifiable code, and establish a hardware root of trust for cryptographic operations in its data centers.

Enterprises are becoming more concerned about security in the face of a series of big attacks, most recently against Equifax which may have leaked financial records for up to 143 million people. (See Equifax Breach Won't Be the Last or Worst.)

Related posts:

— Mitch Wagner Follow me on Twitter Visit my LinkedIn profile Visit my blog Follow me on Facebook Editor, Enterprise Cloud News


CALLING ALL CLOUD, NFV AND SDN COMPANIES:
Make sure your company and services are listed free of charge at Virtuapedia, the comprehensive set of searchable databases covering the companies, products, industry organizations and people that are directly involved in defining and shaping the virtualization industry.


(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Educational Resources
sponsor supplied content
Educational Resources Archive
More Blogs from Wagner’s Ring
SD-WAN is about more than saving money – it also provides application delivery, insights and reliability. Find out more in this podcast sponsored by Citrix.
Platform is designed to enable enterprises to build big data analytics apps that move easily between public and private clouds.
Buying Evident.io extends Palo Alto's portfolio with API-based security capabilities and compliance automation.
Google wants to win the hearts of enterprise IT for Chrome OS on the desktop, but it has a long way to go.
IBM Cloud gets a security and Kubernetes performance boost.
Featured Video
From The Founder
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
Flash Poll
Upcoming Live Events
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
I'm Back for the Future of Communications
Phil Harvey, US News Editor, 4/20/2018
Huawei, ZTE in the Eye of a Trade Storm
Robert Clark, 4/26/2018
US Investigating Huawei for Sanctions Violations – Report
Phil Harvey, US News Editor, 4/25/2018
Facebook Hearings Were the TIP of the Data Iceberg
Dan Jones, Mobile Editor, 4/20/2018
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed
Partner Perspectives - content from our sponsors
What's in the Box?
By Huawei
Beginning With the End In Mind
By Kevin Taylor, for Huawei
All Partner Perspectives