& cplSiteName &

Microsoft Azure 'Confidential Computing' Secures Data In Use

Mitch Wagner
9/15/2017
50%
50%

Microsoft is launching a preview of new security technology that protects data when it is most at risk -- when it's being used.

"This means that data can be processed in the cloud with the assurance that it is always under customer control," Mark Russinovich, Microsoft Azure chief technology officer, says in a Thursday blog post announcing the technology, which the company calls "Azure confidential computing." Microsoft and Intel have been working together on the technology over the past four years, Russinovich says.

Using Azure confidential computing, data is protected from malicious insiders, hackers and malware, and third parties accessing the data without consent, Russinovich says. The technology protects data from Microsoft itself, as well as government warrants and hackers, according to Ars Technica.


Keep up with the latest enterprise cloud news and insights. Sign up for the weekly Enterprise Cloud News newsletter.


Azure confidential computing protects data that's stored "in the clear," which is required for efficient processing, Russinovich says. The service stores data in a Trusted Execution Environment (TEE), also known as an "enclave." The data is accessible only from authorized code, and if the code is altered or tampered with operations are denied and the environment is disabled, Russinovich says.

Initial support is available both in software and hardware. The software implementation is on Windows 10 and Windows Server 2016, through a TEE implemented in Hyper-V.

The hardware implementation uses Intel SGX TEE with the first SGX-capable server in the public cloud, which can run independently of Azure and Microsoft.

Microsoft will continue to work with Intel and other hardware and software partners on additional TEE implementations, Russinovich says.

Microsoft already uses enclaves to protect blockchain financial operations, data stored in SQL Server and its own infrastructure within Azure, Russinovich says.

It's the same technology used in the Coco Framework for enterprise blockchain, introduced last month. (See Microsoft Serves Coco-Flavored Blockchain for Enterprise.)

Azure confidential computing will be useful in implementations including finance, healthcare, artificial intelligence and more, Russinovich says.

Users and developers can try out Azure confidential computing by signing up on theEarly Access program.

Google launched a security chip called Titan last month, to ensure that servers boot from known good state, with verifiable code, and establish a hardware root of trust for cryptographic operations in its data centers.

Enterprises are becoming more concerned about security in the face of a series of big attacks, most recently against Equifax which may have leaked financial records for up to 143 million people. (See Equifax Breach Won't Be the Last or Worst.)

Related posts:

— Mitch Wagner Follow me on Twitter Visit my LinkedIn profile Visit my blog Follow me on Facebook Editor, Enterprise Cloud News


CALLING ALL CLOUD, NFV AND SDN COMPANIES:
Make sure your company and services are listed free of charge at Virtuapedia, the comprehensive set of searchable databases covering the companies, products, industry organizations and people that are directly involved in defining and shaping the virtualization industry.


(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Educational Resources
sponsor supplied content
Educational Resources Archive
More Blogs from Wagner’s Ring
IBM and Cisco are working with Europe's largest port to reduce fuel consumption and other costs and improve safety.
In which we receive an alarming email from Oracle.
SD-WAN is about more than saving money – it also provides application delivery, insights and reliability. Find out more in this podcast sponsored by Citrix.
Platform is designed to enable enterprises to build big data analytics apps that move easily between public and private clouds.
Buying Evident.io extends Palo Alto's portfolio with API-based security capabilities and compliance automation.
Featured Video
From The Founder
John Chambers is still as passionate about business and innovation as he ever was at Cisco, finds Steve Saunders.
Flash Poll
Upcoming Live Events
September 12, 2018, Los Angeles, CA
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 6, 2018, London, United Kingdom
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
Telecom Jargonosaurus Part 1: Repeat Offenders
Iain Morris, News Editor, 7/13/2018
AT&T's Stankey Serves Up a Stinker at HBO
Iain Morris, News Editor, 7/10/2018
Broadcom Buys CA – Huh?
Mitch Wagner, Executive Editor, Light Reading, 7/11/2018
Verizon Taps Malady as Acting CTO
Dan Jones, Mobile Editor, 7/12/2018
FCC's Rosenworcel: US 'Falling Behind' on 5G
Iain Morris, News Editor, 7/13/2018
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed