Trace Id is missing
Skip Navigation

Azure confidential computing

Increase data privacy by protecting data in use.

Learn about the new Azure confidential computing announcements at Inspire 2023

Data privacy and secure multiparty data analytics

Increase data privacy and security surrounding business and consumer data by protecting data in use. Discover new opportunities by enabling multiparty data analytics and machine learning that combine datasets, keeping data private among participants. Take advantage of the broad range of confidential compute offerings Azure provides, including hardware, services, SDKs, and deployment tools.

Video container
A worker in a server room

Secure your sensitive and regulated data while it's being processed in the cloud. Azure confidential computing encrypts data in memory in hardware-based trusted execution environments and processes it only after the cloud environment is verified, helping prevent data access by cloud providers, administrators, and users. Build on top of secure hardware using familiar tools, software, and cloud infrastructure, or migrate your existing workloads and applications.

Hands typing on a laptop in a safety case

Combine datasets confidentially, without exposing your data to other contributing organizations. Benefit from confidential computing and great AI and machine learning insights. Upload encrypted data to a secure enclave in a virtual machine and perform algorithms on datasets from multiple sources.

People working on machines in a data storage room

Migrate to the cloud and keep full control of your data in a trusted execution environment. Specify the hardware and software that have access to your data and code, and verifiably enforce this guarantee. Customers retain control over their protected information so they can meet government regulations and compliance needs. Customize your confidential computing path using tools and solutions built in Azure, in open-source frameworks, and by independent software vendor partners.

Back to tabs

Explore Azure confidential computing solution architectures

Confidential computing applies to various use cases for protecting data in use across industries such as government, financial services, and healthcare.

Healthcare platform confidential computing

Combine data confidentially using Azure confidential computing for AI-enhanced diagnostics.

Multiparty privacy-preserving computation

Share data, do computations, and arrive at a mutual result without divulging private data.

Related products

VMs with Application Enclaves

Create enclaves that protect data while processing in the CPU by keeping it encrypted and isolated in memory, thus protecting data from the operating system, hypervisors with escalated privileges, and Azure operators.

Confidential VMs

Easy way to deploy confidential workloads without requiring changes to existing applications or code.

Confidential containers

Deploy and manage containerized applications more easily with a fully managed Kubernetes service.

SQL Azure Always Encrypted

Expand confidential computing capabilities of Always Encrypted by enabling in-place encryption and richer confidential queries.

Trusted launch

Improve the security of generation 2 VMs with trusted launch, protecting against advanced and persistent attack techniques.

Azure confidential ledger

Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence.

Microsoft Azure Attestation

Remotely verify the trustworthiness of a platform and the integrity of the binaries running inside it.

Azure Key Vault M-HSM

Safeguard cryptographic keys and other secrets used by cloud apps and services.

Customers are doing great things with Azure confidential computing

Protecting data for millions of customers

"We utilize Azure confidential computing to provide scalable, secure environments for our services. Signal puts users first, and Azure helps us stay at the forefront of data protection with confidential computing."
Jim O'Leary, VP of Engineering, Signal
A top down view of a person standing at a desk using a touchscreen monitor

Personalizing offers while protecting privacy

"With Azure confidential computing, we can personalize offerings and protect privacy at the same time, creating exceptional digital experiences that clients can trust."
Eddy Ortiz, Vice President of Innovation and Solution Acceleration, Royal Bank of Canada
The Royal Bank of Canada building

Using privacy-preserving analytics in healthcare

"With this new technology, we expect to markedly reduce the time and cost, while also addressing data security concerns."
Michael Blum, MD, Associate Vice Chancellor for Informatics, UCSF
People working at their desks in an office
Back to tabs

Frequently asked questions

  • Confidential computing protects data in use. Confidential computing encrypts data in memory and processes it only after the cloud environment is verified to be a trusted execution environment, helping prevent data access by cloud operators, malicious admins, and privileged software.

  • As datasets grow because of AI and cloud scalability, scrutiny on how data can be exposed is increasing—from both a consumer data privacy perspective and a compliance and regulation perspective. In parallel, the complexity of cyberthreats and ongoing attacks means organizations must proactively ensure that data is protected throughout its lifecycle.

  • Confidential computing is expanding from regulated industries such as healthcare and financial services to the retail, manufacturing, and energy sectors. Every industry can benefit from it.

  • Common uses include reducing fraud and waste, anticorruption, antiterrorism, records and evidence management, intelligence analysis, global weapons systems and logistics management, vulnerable population protection (such as child exploitation and human trafficking), fighting money laundering, digital currencies, blockchain, transaction processing, customer analytics, proprietary analytics and algorithms, disease diagnostics, drug development, and contact tracing.

  • Blockchain technologies built on top of Azure confidential computing use hardware-based privacy to enable data confidentiality and secure computations.

  • Subscribe to the Azure Confidential Computing Blog so you don’t miss a thing.

Secure your workloads

Learn about confidential computing concepts, take tutorials, and create and deploy applications.

Deploy in Azure

Deploy a virtual machine from Azure with Intel SGX-enabled hardware using the app, available on Azure Marketplace.