Book description
Razi Rais, Graham Bury, Jeff Birnbaum, and Vikas Bhatia from Microsoft reveal how Microsoft Azure confidential computing (ACC) empowers organizations to align with zero trust principles while leveraging Azure cloud to design and deploy highly confidential applications. ACC offers a holistic solution for confidential computing and supports a variety of workload modalities ranging from lift-and-shift containerized applications to cutting-edge artificial intelligence use cases.
This report is ideal for CISOs, technical managers, cloud architects, IT decision makers, and anyone else in a senior technical leadership position who wants to learn:
- What confidential computing (CC) is and what problem it solves
- How key tenets of CC enable zero trust principles
- How Microsoft's Azure confidential computing enables organizations to take advantage of confidential computing at cloud scale
- Various ACC offerings, including core services and support for IaaS-, PaaS-, and SaaS-based workloads
- Real-world CC use cases and case studies, as well as Microsoft's role in CC advancement
Table of contents
- Foreword
- 1. Understanding Confidential Computing and Trust
- 2. Use Cases and Scenarios
- 3. Azure Confidential Computing Portfolio
- 4. Road Ahead
- A. Abbreviations and Acronyms
- B. Confidential Computing and Other Privacy-Enhancing Technologies
- About the Authors
Product information
- Title: Azure Confidential Computing and Zero Trust
- Author(s):
- Release date: November 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098153809
You might also like
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Cloud Native Infrastructure with Azure
The cloud is becoming the de facto home for companies ranging from enterprises to startups. Moving …
book
In Zero Trust We Trust
Before an enterprise answers How can we achieve a Zero Trust architecture? they should be asking …