Skip navigation

The Enclave Device Blueprint for Confidential Computing at the Edge

Published: 18/10/2021

A White Paper by Arm, Microsoft and Scalys 

To help protect data in the Internet of Things (IoT), developers are using a relatively new technique from the cloud, called confidential computing, to isolate sensitive operations in a Trusted Execution Environments during processing. IoT data remains protected when in use, so it’s easier to meet strict regulatory requirements for data privacy and introduce new use cases involving sensitive data. This paper summarizes confidential computing and its potential for edge and highlights how Arm and Microsoft are working with other industry leaders to make it easier to enable secure and isolated environments for confidential computing.  

A community approach to bring confidential computing at the edge and IoT into mainstream for privacy and safety