{"id":29364,"date":"2023-08-29T09:00:00","date_gmt":"2023-08-29T16:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/en-us\/blog\/?p=29364"},"modified":"2025-06-12T22:10:49","modified_gmt":"2025-06-13T05:10:49","slug":"microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/","title":{"rendered":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Microsoft Azure hardware\u2019s security posture is foundational to the security promises we make to our customers. The supply chain of Microsoft Azure servers relies on a multifaceted and complex ecosystem of partners across silicon production, assembly, systems integration, transit, and operationalization in data centers. Multiple interaction points across this supply chain pose significant threats to the security and integrity of an Azure server landing in production. These risks include firmware tampering, hardware tampering, installation of malicious code or spyware, weakened security controls, and many more. We at Microsoft believe it is critical to build mechanisms to proactively detect and remediate such issues during the early phases of product development or before servers dock in a data center.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hardware Root-of-Trust (RoT) devices such as <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/project-cerberus\" target=\"_blank\" rel=\"noreferrer noopener\">Cerberus<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/information-protection\/tpm\/trusted-platform-module-top-node\" target=\"_blank\" rel=\"noreferrer noopener\">Trusted Platform Module<\/a> are the cornerstone for establishing foundational trust on hardware components in our cloud. This ensures the authenticity and integrity of these components and their firmware with traceability all the way back to silicon manufacturing. The best way to accomplish our objective is to verify \u201cprovenance\u201d of our servers throughout their lifecycle from factory to production using hardware RoT device identities. During the silicon manufacturing process, the device identity is securely extracted and annotated to uniquely identify trusted devices. This mitigates the risk of \u201crogue\u201d devices finding their way into the Azure fleet undetected (Figure 1).&nbsp;<a href=\"https:\/\/www.lenovo.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lenovo<\/a> is one of our leading supplier partners that are pushing the boundaries of secure supply chain with us.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To further protect these hardware RoT identities on which we anchor the chain of trust, we leverage the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/application-development\" target=\"_blank\" rel=\"noreferrer noopener\">power of enclaves<\/a> and the <a href=\"https:\/\/ccf.dev\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Consortium Framework<\/a> with <a href=\"https:\/\/aka.ms\/confidentialledger\">Microsoft Azure confidential ledger<\/a> to integrity-protect our supplier provenance database. Learn more about our<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/firmware\" target=\"_blank\" rel=\"noreferrer noopener\"> firmware integrity protections<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure confidential ledger integrity protects existing databases and applications by acting as a point-in-time source of truth which provides cryptographic proofs in verification scenarios. Specifically, stored data is not only immutable and tamper-proof in the append-only ledger but is also independently verifiable. It is also beneficial as a repository of audit trails or records that need to be kept intact and selectively shared with certain personas. Data logged in the ledger remains immutable, privacy-enhanced, and protected from insider threats within an organization or even the cloud provider. &nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this scenario, Azure confidential ledger provides industry-leading tamper-evidence capabilities to determine if any unauthorized manipulations have occurred with these sensitive device identities. At different points in time, verification checks are executed against the Azure confidential ledger to ensure that the data is consistent and pristine. Using this technology also mitigates tampering risks from highly privileged Azure operators.&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp\" alt=\"Flowchart of Provenance Verification using Hardware Root-of-Trust Identities. \" class=\"wp-image-29419 webp-format\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp 1024w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-300x195.webp 300w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-768x499.webp 768w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.webp 1123w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp\"><figcaption class=\"wp-element-caption\">Figure 1: Azure confidential ledger protects provenance verification using hardware root-of-trust identities.&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Azure confidential ledger is used to light up a critical infrastructure security scenario\u2014Project Odyssey. Project Odyssey aims to cryptographically verify the provenance of hardware RoT devices (attached to servers) as they undertake their journey from OEM floors to Microsoft Azure data centers and throughout their production lifecycle. As part of the manufacturing workflow, suppliers upload a signed manifest of hardware RoT identities into a trusted \u2018provenance database\u2019 that uses tamper-evident Azure confidential ledger integration. As the devices are assembled into components, blades, and racks, their identities can be verified at each step of the supply chain process. After long journeys by air, land, and sea, the assembled racks arrive at Microsoft Data Centers where they undergo additional checks to ensure that they were not tampered with during transit. Finally, when a server is ready for production, it <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/measured-boot-host-attestation\" target=\"_blank\" rel=\"noreferrer noopener\">undergoes attestation<\/a> where its hardware RoT identity can be re-verified before allowing it to join the production environment and host customer workloads. Servers are expected to undergo this process periodically ensuring that the hardware components stay compliant throughout their lifecycle, thereby ensuring that malicious and unauthorized swapping of blades and motherboards is detected, and non-compliant servers can be tagged for eviction, investigation, and remediation.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is only one piece of our overall hardware security story. Microsoft Azure has developed comprehensive security requirements to enable security capabilities such as secure boot, secure update, attestation, recovery, encryption, and telemetry to ensure Azure hardware is resilient to such attacks through robust capabilities around prevention, detection, and response.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Read more about how we <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/firmware\" target=\"_blank\" rel=\"noreferrer noopener\">secure Microsoft Azure\u2019s hardware and firmware<\/a>.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, a core part of our culture is leveraging the work of each other to deliver industry-leading security to our customers with a defense in-depth approach. Azure hardware device provenance and supply chain security is a fundamental building block of our foundational security stack. Through cryptographic provenance verification of Azure hardware via Project Odyssey and additional defense-in-depth protections of hardware device identities using Azure confidential ledger, we are setting the gold standard in cloud hardware supply chain security to benefit our customers.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><em>&#8220;Lenovo\u2019s key priority is to verify and ensure the end-to-end security and traceability for Microsoft cloud hardware. By implementing this process in both our component and system integration factories, not only can we trust that the hardware we receive from downstream ODM\/OEM suppliers is secured and trusted, but we can add the Lenovo fingerprint data to the chain of trust, which helps assure Microsoft that the hardware received by data centers is fully secured and trustworthy.<\/em>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Integrating this solution into the Lenovo global supply chain workflow was exceptionally smooth thanks to the thorough documentation and examples that the Microsoft team maintains on an ongoing basis. Assuring the integrity and traceability of data in Azure confidential ledger allows Lenovo to focus on process and product quality, without needing to spend extra development cycles working on an in-house security solution.&#8221;<\/em>\u2014James McFadden, Executive Director, Supply Chain Quality &amp; Engineering, Lenovo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Read about how Microsoft <a href=\"https:\/\/aka.ms\/confidentialledger\" target=\"_blank\" rel=\"noreferrer noopener\">Azure confidential ledger<\/a> protects the integrity of your data.&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Read about Microsoft Azure\u2019s <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/firmware\" target=\"_blank\" rel=\"noreferrer noopener\">hardware and firmware security<\/a>.&nbsp;<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We at Microsoft believe it is critical to build mechanisms to proactively detect and remediate such issues during the early phases of product development or before servers dock in a data center.<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1473,1459,1491],"tags":[2588],"audience":[3053,3056],"content-type":[1481],"product":[1619],"tech-community":[],"topic":[],"coauthors":[1728],"class_list":["post-29364","post","type-post","status-publish","format-standard","hentry","category-databases","category-security","category-storage","tag-azure-built-in-security","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-azure-confidential-ledger","review-flag-1680286581-295","review-flag-1680286581-56","review-flag-1-1680286581-825","review-flag-lever-1680286579-649"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-29T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T05:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1123\" \/>\n\t<meta property=\"og:image:height\" content=\"729\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Salim Chawro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salim Chawro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/salim-chawro\/\",\"@type\":\"Person\",\"@name\":\"Salim Chawro\"}],\"headline\":\"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain\",\"datePublished\":\"2023-08-29T16:00:00+00:00\",\"dateModified\":\"2025-06-13T05:10:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\"},\"wordCount\":991,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp\",\"keywords\":[\"Azure Built-In Security\"],\"articleSection\":[\"Databases\",\"Security\",\"Storage\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\",\"name\":\"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp\",\"datePublished\":\"2023-08-29T16:00:00+00:00\",\"dateModified\":\"2025-06-13T05:10:49+00:00\",\"description\":\"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.\\\"\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.webp\",\"width\":1123,\"height\":729},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/b2603da1afac705823964361ce9072c0\",\"name\":\"Kristin Gallagher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=gb83eb8c5c3f8feea9763b473dabe8524\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g\",\"caption\":\"Kristin Gallagher\"},\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/kristingallagher\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog","description":"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog","og_description":"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.\"","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2023-08-29T16:00:00+00:00","article_modified_time":"2025-06-13T05:10:49+00:00","og_image":[{"width":1123,"height":729,"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.png","type":"image\/png"}],"author":"Salim Chawro","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Salim Chawro","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/salim-chawro\/","@type":"Person","@name":"Salim Chawro"}],"headline":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain","datePublished":"2023-08-29T16:00:00+00:00","dateModified":"2025-06-13T05:10:49+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/"},"wordCount":991,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp","keywords":["Azure Built-In Security"],"articleSection":["Databases","Security","Storage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/","name":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot-1024x665.webp","datePublished":"2023-08-29T16:00:00+00:00","dateModified":"2025-06-13T05:10:49+00:00","description":"We at Microsoft are offering integrity protection products for customers, and using the same products to build a trustworthy cloud. Learn more about how we use Azure Confidential Ledger to secure the journey of a server from factory to production.\"","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2023\/08\/hw-rot.webp","width":1123,"height":729},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-confidential-ledger-enhancing-customer-trust-in-azures-hardware-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Microsoft Azure confidential ledger: Enhancing customer trust in Azure\u2019s hardware supply chain"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/b2603da1afac705823964361ce9072c0","name":"Kristin Gallagher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=gb83eb8c5c3f8feea9763b473dabe8524","url":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/295fa37b6bb2bbf59603c38b6ac7a7b4b86cd0f736387182fa9d0117f52cdf5e?s=96&d=mm&r=g","caption":"Kristin Gallagher"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/kristingallagher\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/29364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=29364"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/29364\/revisions"}],"predecessor-version":[{"id":41717,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/29364\/revisions\/41717"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=29364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=29364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=29364"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=29364"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=29364"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=29364"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=29364"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=29364"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=29364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}