{"id":23523,"date":"2023-05-11T09:00:00","date_gmt":"2023-05-11T16:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/en-us\/blog\/?p=23523"},"modified":"2025-06-16T05:45:58","modified_gmt":"2025-06-16T12:45:58","slug":"microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/","title":{"rendered":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In the&nbsp;<a href=\"https:\/\/azure.microsoft.com\/blog\/microsoft-azures-defense-in-depth-approach-to-cloud-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">first blog<\/a>&nbsp;of our series on&nbsp;<a href=\"https:\/\/azure.microsoft.com\/en-us\/explore\/security\/\">Azure Security<\/a>, we delved into our defense-in-depth approach for tackling cloud vulnerabilities. The&nbsp;<a href=\"https:\/\/azure.microsoft.com\/blog\/microsoft-azure-security-expands-variant-hunting-capacity-at-a-cloud-tempo\/\" target=\"_blank\" rel=\"noreferrer noopener\">second blog<\/a>&nbsp;highlighted our use of variant hunting to detect patterns of vulnerabilities across our services. In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/resources\/built-in-security\">built-in security<\/a> for years to come, ensuring a secure cloud experience for our customers. We will discuss our focus on secure multitenancy and share our vision for harnessing the power of Confidential Compute and the Rust programming language to protect our customers&#8217; data from cyber threats. By investing in groundbreaking security strategies, such as Secure Multitenancy, Confidential Compute, and the Rust programming language, Azure provides customers with robust, built-in security measures that not only protect their data but also enhance the overall cloud experience, giving customers the confidence to innovate and grow their businesses securely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"secure-multitenancy-with-robust-compute-network-and-credential-isolation\">Secure multitenancy with robust compute, network, and credential isolation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In our&nbsp;<a href=\"https:\/\/azure.microsoft.com\/blog\/microsoft-azures-defense-in-depth-approach-to-cloud-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">first blog<\/a>, we touched on the benefits we\u2019ve seen from improvements in compute, network, and credential isolation. Now, we want to dive deeper into what this means. For compute isolation, we\u2019re investing heavily in hardware-based virtualization (HBV), the foundation of running untrusted code in Azure. Traditional Virtual Machines are at the core of many Azure Services hosting customer workloads. Our current bounty of up to&nbsp;<a href=\"https:\/\/www.microsoft.com\/msrc\/bounty-hyper-v\" target=\"_blank\" rel=\"noreferrer noopener\">USD250,000<\/a>&nbsp;on Microsoft Hyper-V vulnerabilities demonstrates our strong defense and highlights the importance of this boundary.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our innovations with HBV extends beyond traditional virtual machines (VMs).&nbsp;<a href=\"https:\/\/azure.microsoft.com\/products\/container-instances\">Azure Container Instances<\/a>&nbsp;(ACI) serve as our platform for running container workloads, utilizing HBV to isolate&nbsp;<a href=\"https:\/\/learn.microsoft.com\/azure\/container-instances\/container-instances-container-groups\" target=\"_blank\" rel=\"noreferrer noopener\">container groups<\/a>&nbsp;from each other. ACI container groups take advantage of the same HBV that powers Azure Virtual Machines, but they offer a platform tailored for modern container-based applications. Numerous new and existing services are moving to ACI as a simple, high-performance model for secure multitenancy. Building services atop secure foundations like ACI enables us to address many isolation problems centrally, allowing multiple services to benefit from fixes simultaneously. Furthermore, we&#8217;re excited to introduce HBV to Kubernetes workloads via industry-standard&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/apps-on-azure-blog\/preview-support-for-kata-vm-isolated-containers-on-aks-for-pod\/ba-p\/3751557\" target=\"_blank\" rel=\"noreferrer noopener\">Kata Container support<\/a>&nbsp;in&nbsp;<a href=\"https:\/\/azure.microsoft.com\/products\/kubernetes-service\">Azure Kubernetes Service<\/a>. Similar to ACI container groups, Kata Container pods utilize HBV for robust isolation of untrusted workloads. In the coming months, we&#8217;ll share more about our efforts to bring this approach to WebAssembly hosting, boasting single-millisecond overhead compared to hosting WebAssembly without HBV. For network isolation, we&#8217;re shifting services towards dedicated virtual networks per tenant and ensuring support for&nbsp;<a href=\"https:\/\/azure.microsoft.com\/products\/private-link\/\">Private Links<\/a>&nbsp;which enable our services to communicate directly with customer-managed virtual networks. Shared networks have proven error-prone, with mistakes in network Access Control Lists or subnets leading to inadequate network isolation between tenants. Dedicated virtual networks make it difficult to accidentally enable connectivity between tenants that should remain separate.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Credential isolation, on the other hand, involves using credentials scoped to the resources of a single tenant whenever possible. Employing credentials with minimal permissions ensures that even if vulnerabilities are discovered, credentials providing access to other tenants&#8217; data aren&#8217;t readily available.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Through significant investments in HBV and a focus on compute, network, and credential isolation, Azure is providing customers with enhanced security and isolation for their workloads. By developing innovative solutions such as Azure Container Instances, and bringing HBV to Kubernetes and WebAssembly hosting, we are creating a robust and secure multitenancy environment that protects data and improves the overall cloud experience. As we continue to strengthen Azure&#8217;s security foundation, we are also exploring new opportunities to further enhance our defense-in-depth approach. In the next section, we will discuss the role of Confidential Compute in adding an extra layer of protection to our customers&#8217; data and workloads.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"confidential-compute-a-new-layer-of-defense\">Confidential Compute: A new layer of defense<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Since the dawn of cloud computing in Azure, we\u2019ve recognized the crucial role of HBV in running customer workloads on VMs. However, VMs only protect the host machine from malicious activity within the VM. In many cases, a vulnerability in the VM interface could allow a bad actor to escape to the host, and from there they could fully access other customers\u2019 VM. Confidential Compute presents a new layer of defense against these attacks by preventing bad actors with hosting environment access from accessing the content running in a VM. Our goal is to leverage <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/confidential-vm-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential VMs<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/confidential-containers\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Containers<\/a> broadly across Azure Services, adding this extra layer of defense to VMs and containers utilized by our services. This has the potential to reduce the blast radius of a compromise at any level in Azure. While ambitious, one day using Confidential Compute should be as ubiquitous as other best practices have become such as encryption in transit or encryption at rest.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"rust-as-the-path-forward-over-c-c\">Rust as the path forward over C\/C++<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Decades of vulnerabilities have proven how difficult it is to prevent memory-corrupting bugs when using C\/C++. While garbage-collected languages like C# or Java have proven more resilient to these issues, there are scenarios where they cannot be used. For such cases, we\u2019re betting on Rust as the alternative to C\/C++. Rust is a modern language designed to compete with the performance C\/C++, but with memory safety and thread safety guarantees built into the language. While we are not able to rewrite everything in Rust overnight, we\u2019ve already adopted Rust in some of the most critical components of Azure\u2019s infrastructure. We expect our adoption of Rust to expand substantially over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"our-unwavering-commitment\">Our unwavering commitment<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our commitment to secure multitenancy, Confidential Compute, and Rust represents a major investment that we\u2019ll be making in the coming years. Fortunately, Microsoft\u2019s security culture is among the strongest in the industry, empowering us to deliver on these ambitious bets. By prioritizing security as an integral component of our services, we are helping our customers to build and maintain secure, reliable, and scalable applications in the cloud, while ensuring their trust in our platform remains steadfast.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Read the previous&nbsp;<a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/tag\/azure-built-in-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">two blogs in this series<\/a>&nbsp;to learn how Azure leverages a defense-in-depth security approach and cloud variant hunting to learn from vulnerabilities and layer protection throughout every phase of design, development, and deployment.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Explore the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/resources\/built-in-security\" target=\"_blank\" rel=\"noreferrer noopener\">built-in security features<\/a> in our cloud platforms and technologies that help you be secure from the start.&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Join Azure Security engineering experts at <a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/6da00f4d-58a8-449e-9f00-cffb5c943bd2?source=sessions\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Build<\/a> to engage in live Q&amp;A around Azure&#8217;s robust defense-in-depth strategies, the intriguing world of cloud variant hunting, and maintaining secure multitenancy. Don&#8217;t miss this chance to enhance your skills and remain at the forefront of the ever-changing cybersecurity landscape.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1467,1470],"tags":[2588],"audience":[3053,3056],"content-type":[1465],"product":[1472,2578],"tech-community":[],"topic":[],"coauthors":[2579],"class_list":["post-23523","post","type-post","status-publish","format-standard","hentry","category-compute","category-containers","tag-azure-built-in-security","audience-it-decision-makers","audience-it-implementors","content-type-announcements","product-azure-kubernetes-service-aks","product-azure-security","review-flag-1680286581-295","review-flag-1680286581-56","review-flag-1680286581-364","review-flag-lever-1680286579-649","review-flag-microsofts","review-flag-new-1680286579-546","review-flag-vm-1680286585-143"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-11T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T12:45:58+00:00\" \/>\n<meta name=\"author\" content=\"Jeffrey Cooperstein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeffrey Cooperstein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/jeffrey-cooperstein\/\",\"@type\":\"Person\",\"@name\":\"Jeffrey Cooperstein\"}],\"headline\":\"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust\",\"datePublished\":\"2023-05-11T16:00:00+00:00\",\"dateModified\":\"2025-06-16T12:45:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\"},\"wordCount\":1136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"keywords\":[\"Azure Built-In Security\"],\"articleSection\":[\"Compute\",\"Containers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\",\"name\":\"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2023-05-11T16:00:00+00:00\",\"dateModified\":\"2025-06-16T12:45:58+00:00\",\"description\":\"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/dddfb06db704f28e44dc633b15e0d6ae\",\"name\":\"Brianna McGovern\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g5fc6a76f72449f78acaf535ec3e0c54f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g\",\"caption\":\"Brianna McGovern\"},\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/briannamcgovern\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog","description":"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog","og_description":"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2023-05-11T16:00:00+00:00","article_modified_time":"2025-06-16T12:45:58+00:00","author":"Jeffrey Cooperstein","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Jeffrey Cooperstein","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/jeffrey-cooperstein\/","@type":"Person","@name":"Jeffrey Cooperstein"}],"headline":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust","datePublished":"2023-05-11T16:00:00+00:00","dateModified":"2025-06-16T12:45:58+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/"},"wordCount":1136,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"keywords":["Azure Built-In Security"],"articleSection":["Compute","Containers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/","name":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2023-05-11T16:00:00+00:00","dateModified":"2025-06-16T12:45:58+00:00","description":"In this installment, we will introduce our game-changing bets that will enable us to deliver industry-leading security architectures with\u00a0built-in security\u00a0for years to come, ensuring a secure cloud experience for our customers.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/dddfb06db704f28e44dc633b15e0d6ae","name":"Brianna McGovern","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g5fc6a76f72449f78acaf535ec3e0c54f","url":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g","caption":"Brianna McGovern"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/briannamcgovern\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=23523"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23523\/revisions"}],"predecessor-version":[{"id":41879,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/23523\/revisions\/41879"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=23523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=23523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=23523"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=23523"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=23523"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=23523"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=23523"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=23523"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=23523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}