{"id":23499,"date":"2023-05-08T09:00:00","date_gmt":"2023-05-08T16:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/en-us\/blog\/?p=23499"},"modified":"2025-06-16T06:30:43","modified_gmt":"2025-06-16T13:30:43","slug":"insights-from-the-2023-open-confidential-computing-conference","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/","title":{"rendered":"Insights from the 2023 Open Confidential Computing Conference"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">I had the opportunity to participate in this year&#8217;s Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. This year&#8217;s event was particularly noteworthy due to a panel discussion on the\u00a0<a href=\"https:\/\/aka.ms\/panel-OC3-2023\" target=\"_blank\" rel=\"noreferrer noopener\">impact and future of confidential computing<\/a>. The panel\u00a0featured\u00a0some of the industry&#8217;s most respected technology leaders including Greg Lavender, Chief Technology\u00a0Officer at Intel, Ian Buck, Vice President\u00a0of Hyperscale and HPC at NVIDIA, and Mark Papermaster, Chief Technology\u00a0Officer at AMD. Felix Schuster, Chief Executive Officer at Edgeless Systems, moderated the panel discussion, which explored topics such as the definition of confidential computing, customer adoption patterns, current challenges, and future developments. The insightful discussion left a lasting impression on me and my colleagues<\/p>\n\n\n\n<figure class=\"wp-block-msx-ump-embed wp-block-msx-ump-embed\" class=\"wp-block-msxcm-ump-embed\">\n\t<div class=\"wp-block-embed__wrapper\">\n\t\t<universal-media-player id=\"ump-69d53a813e19d\"><\/universal-media-player>\n\t\t<script type=\"module\">\n\t\t\tconst currentTheme =\n\t\t\t\tlocalStorage.getItem('msxcmCurrentTheme') ||\n\t\t\t\t(window.matchMedia('(prefers-color-scheme: dark)').matches ? 'dark' : 'light');\n\n\t\t\t\/\/ Modify player theme based on localStorage value.\n\t\t\tlet options = {\"autoplay\":false,\"hideControls\":null,\"language\":\"en-us\",\"loop\":false,\"partnerName\":\"cloud-blogs\",\"poster\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/image\\\/microsoftcorp\\\/RW13d51-0x1080-6439k?wid=1280\",\"title\":\"\",\"sources\":[{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/RW13d51-0x1080-6439k-0x1080-6439k\",\"type\":\"video\\\/mp4\",\"quality\":\"HQ\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/RW13d51-0x1080-6439k-0x720-3266k\",\"type\":\"video\\\/mp4\",\"quality\":\"HD\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/RW13d51-0x1080-6439k-0x540-2160k\",\"type\":\"video\\\/mp4\",\"quality\":\"SD\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/RW13d51-0x1080-6439k-0x360-958k\",\"type\":\"video\\\/mp4\",\"quality\":\"LO\"}]};\n\n\t\t\tif (currentTheme) {\n\t\t\t\toptions.playButtonTheme = currentTheme;\n\t\t\t}\n\n\t\t\tdocument.addEventListener('DOMContentLoaded', () => {\n\t\t\t\tump(\"ump-69d53a813e19d\", options);\n\t\t\t});\n\t\t<\/script>\n\t<\/div>\n\t<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-confidential-computing\">What is confidential computing?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to understanding what exactly confidential computing entails, it all begins with a trusted execution environment (TEE) that is rooted in hardware. This TEE protects any code and data placed inside it, while in use in memory, from threats outside the enclave. These threats include everything from vulnerabilities in the hypervisor and host operating system to other cloud tenants and even cloud operators. In addition to providing protection for the code and data in memory, the TEE also possesses two crucial properties. The first is the ability to measure the code contained within the enclave. The second property is attestation, which allows the enclave to provide a verified signature that confirms the trustworthiness of what is held within it. This feature allows software outside of the enclave to establish trust with the code inside, allowing for the safe exchange of data and keys while protecting the data from the hosting environment.&nbsp;This&nbsp;includes hosting operating systems, hypervisors, management software and services, and even the operators of the environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Regarding what is not confidential computing, it is not other privacy enhancing technologies (PETs) like homomorphic encryption or secure multiparty computation. It is hardware rooted, trusted execution environments with attestation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In Azure, confidential computing is integrated into our overall defense in depth strategy, which includes trusted launch, customer managed keys, Managed HSM, Microsoft Azure Attestation, and confidential virtual machine guest attestation integration with Microsoft Defender for Cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"customer-adoption-patterns\">Customer adoption patterns<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With regards to customer adoption scenarios for confidential computing, we see customers across regulated industries such as the public sector, healthcare, and financial services ranging from private to public cloud migrations and cloud native workloads. One scenario that I&#8217;m really excited about is multi-party computations and analytics where you have multiple parties bringing their data together, in what is now being called data clean rooms, to perform computation on that data and get back insights that are much richer than what they would have gotten off their own data set alone. Confidential computing addresses the regulatory and privacy concerns around sharing this sensitive data with third parties. One of my favorite examples of this is in the advertising industry, where the Royal Bank of Canada&nbsp;(RBC) has set up a clean room solution where they take merchant purchasing data and combine it with their information around the consumers credit card transactions to get a full picture of what the consumer is doing. Using these insights, RBC\u2019s credit card merchants can then offer their consumer very precise offers that are tailored to them, all without RBC seeing or revealing any confidential information from the consumers or the merchants. I believe that this architecture is the future of advertising.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another exciting multi-party use case is&nbsp;<a href=\"https:\/\/customers.microsoft.com\/en-US\/story\/1503405357498110670-beekeeper-ai-healthcare-microsoft-security-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">BeeKeeperAI\u2019s<\/a>&nbsp;application of confidential computing and machine learning to accelerate the development of effective drug therapies. Until recently, drug researchers have been hampered by inaccessibility of patient data due to strict regulations applied to the sharing of personal health information (PHI). Confidential computing removes this bottleneck by ensuring that PHI is protected not just at rest and when transmitted, but also while in use, thus eliminating the need for data providers to anonymize this data before sharing it with researchers. And it is not just the data that confidential computing is protecting, but also the AI models themselves. These models can be expensive to train and therefore are valuable pieces of intellectual property that need to be protected.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To allow these valuable AI models to remain confidential yet scale, Azure is collaborating with NVIDIA to deploy confidential graphics processing units (GPUs) on Azure based on&nbsp;<a href=\"https:\/\/www.nvidia.com\/en-us\/data-center\/solutions\/confidential-computing\/\" target=\"_blank\" rel=\"noreferrer noopener\">NVIDIA&nbsp;H100 Tensor Core GPU<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"current-challenges\">Current challenges<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Regarding the challenges facing confidential computing, they tended to fall into four broad categories:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Availability, regional, and across services.<\/strong>&nbsp;Newer technologies are in limited supply or still in development, yet Azure has remained a leader in bringing to market services based on Intel<sup>\u00ae<\/sup>&nbsp;Software Guard Extensions (Intel<sup>\u00ae<\/sup>&nbsp;SGX) and AMD Secure Encrypted Virtualization-Secure Nested Paging (<a href=\"https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SEV-SNP<\/a>). We are the first major cloud provider to offer confidential virtual machines based on&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-confidential-computing\/preview-introducing-dcesv5-and-ecesv5-series-confidential-vms\/ba-p\/3800718\" target=\"_blank\" rel=\"noreferrer noopener\">Intel<sup>\u00ae<\/sup>&nbsp;Trust Domain Extensions (Intel<sup>\u00ae<\/sup>&nbsp;TDX)<\/a>&nbsp;and we look forward to being one of the first cloud providers to offer confidential NVIDIA H100 Tensor Core GPUs. We see availability rapidly improving over the next 12 to 24 months.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Ease of adoption for developers and end users.<\/strong>&nbsp;The first generation of confidential computing services, based on Intel SGX technology, required rewriting of code and working with various open source tools to make applications confidential computing enabled. Microsoft and our partners have collaborated on these open source tools and we have an active community of partners running their Intel SGX solutions on Azure. The newer generation of confidential virtual machines on Azure, using AMD SEV-SNP, a hardware security feature enabled by&nbsp;<a href=\"https:\/\/www.amd.com\/en\/technologies\/infinity-guard\" target=\"_blank\" rel=\"noreferrer noopener\">AMD Infinity Gaurd<\/a>&nbsp;and&nbsp;and Intel TDX, lets users run off-the-shelf operating systems, lift and shift their sensitive workloads, and run them confidentially. We are also using this technology to offer confidential containers in Azure which allows users to run their existing container images confidentially.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Performance and interoperability.<\/strong>&nbsp;We need to ensure that confidential computing does not mean slower computing. The issue becomes more important with accelerators like GPUs where the data must be protected as it moves between the central processing unit (CPU) and the accelerator. Advances in this area will come from continued collaboration with standards committees such as the PCI-SIG, which has issued the&nbsp;<a href=\"https:\/\/pcisig.com\/tee-device-interface-security-protocol-tdisp\" target=\"_blank\" rel=\"noreferrer noopener\">TEE Device Interface Security Protocol (TDISP)<\/a>&nbsp;for secure PCIe bus communication and the CXL Consortium which has issued the&nbsp;<a href=\"https:\/\/www.computeexpresslink.org\/about-cxl\" target=\"_blank\" rel=\"noreferrer noopener\">Compute Express Link\u2122 (CXL\u2122)<\/a>&nbsp;specification for the secure sharing of memory among processors.&nbsp;Open source projects like&nbsp;<a href=\"https:\/\/github.com\/chipsalliance\/Caliptra\/blob\/main\/README.md\" target=\"_blank\" rel=\"noreferrer noopener\">Caliptra<\/a>&nbsp;which has created the specification, silicon logic, have read-only memory (ROM), and firmware for implementing a Root of Trust for Measurement (RTM) block inside a system on chip (SoC).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Industry awareness.<\/strong>&nbsp;While confidential computing adoption is growing, awareness among IT and security professionals is still low. There is a tremendous opportunity for all confidential computing vendors to collaborate and participate in events aimed at raising awareness of this technology to key decision-makers such as CISOs, CIOs, and policymakers. This is especially relevant in industries such as government and other regulated sectors where the handling of highly sensitive data is critical. By promoting the benefits of confidential computing and increasing adoption rates, we can establish it as a necessary requirement for handling sensitive data. Through these efforts, we can work together to foster greater trust in the cloud and build a more secure and reliable digital ecosystem for all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-future-of-confidential-computing\">The future of confidential computing<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">When the discussion turned to the future of confidential computing, I had the opportunity to reinforce Azure&#8217;s vision for the confidential cloud, where all services will run in trusted execution environments. As this vision becomes a reality, confidential computing will no longer be a specialty feature but rather the standard for all computing tasks. In this way, the concept of confidential computing will simply become synonymous with computing itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, all panelists agreed that the biggest advances in confidential computing will be the result of industry collaboration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-at-oc3\">Microsoft at OC3<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to the panel discussion, Microsoft participated in several other presentations at&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=Q7Jay_db5Qo\" target=\"_blank\" rel=\"noreferrer noopener\">OC3&nbsp;<\/a>that you may find of interest:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/rmv-host-OC3\" target=\"_blank\" rel=\"noreferrer noopener\">Removing our Hyper-V host OS and hypervisor from the Trusted Computing Base (TCB).<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/conf-container-OC3\" target=\"_blank\" rel=\"noreferrer noopener\">Container code and configuration integrity with confidential containers on Azure.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/cstm-fw-OC3\" target=\"_blank\" rel=\"noreferrer noopener\">Customer managed and controlled Trusted Computing Base (TCB) with CVMs on Azure.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/Vikas-MaryBeth-OC3-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling faster AI model training in healthcare with Azure confidential computing.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.youtube.com\/watch?v=KIGi3jGDkKw\" target=\"_blank\" rel=\"noreferrer noopener\">Project Amber\u2014Intel&#8217;s attestation service.<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, I would like to encourage our readers to learn about&nbsp;<a href=\"https:\/\/aka.ms\/Greg-OC3-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Greg Lavender\u2019s thoughts<\/a>&nbsp;on OC3 2023.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\">All product names, logos, and brands mentioned above are properties of their respective owners.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I had the opportunity to participate in this year&#8217;s Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry&#8217;s most respected technology leaders.<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1470],"tags":[],"audience":[3057,3055,3053,3056],"content-type":[1460,1497],"product":[1803,1471],"tech-community":[],"topic":[],"coauthors":[21],"class_list":["post-23499","post","type-post","status-publish","format-standard","hentry","category-containers","audience-data-professionals","audience-developers","audience-it-decision-makers","audience-it-implementors","content-type-events","content-type-partnerships","product-azure-ai","product-azure-container-apps","review-flag-fall-1680286584-980","review-flag-machi-1680286585-314","review-flag-partn-1680286579-901"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"I had the opportunity to participate in this year&#039;s Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry&#039;s most respected technology leaders. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"I had the opportunity to participate in this year&#039;s Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry&#039;s most respected technology leaders. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T13:30:43+00:00\" \/>\n<meta name=\"author\" content=\"Mark Russinovich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Russinovich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/\",\"@type\":\"Person\",\"@name\":\"Mark Russinovich\"}],\"headline\":\"Insights from the 2023 Open Confidential Computing Conference\",\"datePublished\":\"2023-05-08T16:00:00+00:00\",\"dateModified\":\"2025-06-16T13:30:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\"},\"wordCount\":1451,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"articleSection\":[\"Containers\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\",\"name\":\"Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2023-05-08T16:00:00+00:00\",\"dateModified\":\"2025-06-16T13:30:43+00:00\",\"description\":\"I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Containers\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/containers\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Insights from the 2023 Open Confidential Computing Conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/b2603da1afac705823964361ce9072c0\",\"name\":\"Kristin Gallagher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=gb83eb8c5c3f8feea9763b473dabe8524\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g\",\"caption\":\"Kristin Gallagher\"},\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/kristingallagher\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog","description":"I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/","og_locale":"en_US","og_type":"article","og_title":"Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog","og_description":"I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2023-05-08T16:00:00+00:00","article_modified_time":"2025-06-16T13:30:43+00:00","author":"Mark Russinovich","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Mark Russinovich","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/","@type":"Person","@name":"Mark Russinovich"}],"headline":"Insights from the 2023 Open Confidential Computing Conference","datePublished":"2023-05-08T16:00:00+00:00","dateModified":"2025-06-16T13:30:43+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/"},"wordCount":1451,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"articleSection":["Containers"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/","name":"Insights from the 2023 Open Confidential Computing Conference | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2023-05-08T16:00:00+00:00","dateModified":"2025-06-16T13:30:43+00:00","description":"I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/insights-from-the-2023-open-confidential-computing-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Containers","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/containers\/"},{"@type":"ListItem","position":3,"name":"Insights from the 2023 Open Confidential Computing Conference"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/b2603da1afac705823964361ce9072c0","name":"Kristin Gallagher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=gb83eb8c5c3f8feea9763b473dabe8524","url":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g","caption":"Kristin Gallagher"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/kristingallagher\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=23499"}],"version-history":[{"count":3,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23499\/revisions"}],"predecessor-version":[{"id":41882,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23499\/revisions\/41882"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=23499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=23499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=23499"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=23499"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=23499"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=23499"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=23499"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=23499"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=23499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}