{"id":45677,"date":"2025-08-25T08:00:00","date_gmt":"2025-08-25T15:00:00","guid":{"rendered":""},"modified":"2025-08-25T16:42:43","modified_gmt":"2025-08-25T23:42:43","slug":"protecting-azure-infrastructure-from-silicon-to-systems","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/","title":{"rendered":"Protecting Azure Infrastructure from silicon to systems"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Since launching the Secure Future Initiative (SFI)\u2014a company-wide commitment to security, we continue to prioritize delivering products and solutions that are <em>secure by design<\/em>, <em>secure by default<\/em>, and <em>secure in operation<\/em>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SFI sits at the core of Azure\u2019s approach to designing hardware systems, reshaping the architecture, deployment, and operations of our physical cloud and AI infrastructure. Azure is redefining workload security from the datacenter to the edge. Our comprehensive approach includes <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-machines\/boost\">Azure Boost<\/a>, which isolates control and data planes for virtual machines; the <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/AzureInfrastructureBlog\/securing-azure-infrastructure-with-silicon-innovation\/4293834\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Integrated HSM<\/a>, a custom security chip providing FIPS 140-3 Level 3 key protection within our servers; and <a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/\">confidential computing<\/a>, which protects data in-use through hardware-based trusted execution environments (TEEs).\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has also made ongoing efforts to advance systematic security audits and contribute to the open-source community through Caliptra\u2014a silicon root-of-trust designed to anchor security in hardware. Combining these initiatives with technologies such as confidential computing and code transparency services, our aim is to ensure that every component in the supply chain can be securely verified.\u202f<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"289\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch.jpg\" alt=\"Building blocks of Azure\u2019s hardware security\u202fArchitecture\u202f.\" class=\"wp-image-45796\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch.jpg 624w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch-300x139.jpg 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 1: Building blocks of Azure\u2019s hardware security\u202fArchitecture\u202f<\/em>.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"purpose-built-silicon-for-defense-in-depth\">Purpose built silicon for defense-in-depth\u202f<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-boost\/overview\"><strong>Azure Boost<\/strong><\/a> serves as the system\u2019s\u202fsecurity controller, managing secure access to Azure. Only systems with a verified and approved security configuration are granted access.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To enhance security and performance, Azure Boost\u202foffloads control plane services\u202ffrom the host CPU to a dedicated Azure Boost system controller. This setup creates a hardware separation \u202fbetween Azure\u2019s control plane\u2014running on the Azure Boost controller\u2014and customer workloads\u2014running on the CPU\u2014ensuring strong isolation and protection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/aka.ms\/AzureIntegratedHSM\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Integrated HSM<\/a> is a server local Hardware Security Module (HSM) for high-assurance workloads. It is designed to meet the stringent requirements of the Federal Information Processing Standards (FIPS) 140-3 Level 3 security requirements, requiring strong isolation, tamper-resistant hardware, identity-based authentication, and automatic zeroization. Azure Integrated HSM protects keys in-use, by ensuring keys always remain within the bounds of the HSM.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Unlike centralized remote HSM services, Azure Integrated HSM eliminates network roundtrips for key operations and avoids the need to release keys into the workload environment. Instead of relying on remote access, the Azure Integrated HSM is securely bound to the local workload and provides oracle-style key usage to authorized services within the local environment.\u202f<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.microsoft.com\/blog\/AzureInfrastructureBlog\/securing-azure-infrastructure-with-silicon-innovation\/4293834\">Learn more about Azure Integrated HSM<\/a><\/div>\n<\/div>\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-26.webp\" alt=\"A hand holding Azure Integrated HSM, a security chip.\" class=\"wp-image-45678 webp-format\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-26.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/delivering-consistency-and-transparency-for-cloud-hardware-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Datacenter Secure Control Module<\/a> (DC-SCM)\u2014DC-SCM is a security and server control module that contains Hydra\u2014a security-focused Board Management Controller (BMC) design, with an integrated root-of-trust and hardware-based security protection on all management interfaces.\u202fThis root of trust restricts unauthorized access to BMC firmware and ensures the firmware is authenticated and cryptographically measured.\u202f<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"confidential-computing-offers-a-spectrum-of-guarantees\">Confidential Computing offers a spectrum of guarantees<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/\"><strong>Confidential computing<\/strong><\/a> makes use of hardware-based Trusted Execution Environments (TEEs) to protect workloads\u2014such as virtual machines\u2014from other system software, including the hypervisor.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft, a founding member of the <a href=\"https:\/\/confidentialcomputing.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Computing Consortium<\/a>, works closely with CPU and GPU manufacturers to design and integrate confidential computing technologies directly into their hardware. Earlier this year at the Confidential Computing Summit we <a href=\"https:\/\/www.confidentialcomputingsummit.com\/e\/ccs25\/page\/on-demand-content\" target=\"_blank\" rel=\"noreferrer noopener\">defined a spectrum of guarantees<\/a> users can enable with confidential computing when they port their applications, including:\u202f&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>On<\/strong> by default, is the lift and shift existing applications with minimal change.\u202f\u202f&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Build <strong>in<\/strong> confidential computing by designing services and applications that make deeper use of hardware-based protections.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Leverage transparent confidential computing to gain deeper insights into how confidential services interact and operate securely.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"269\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc.jpg\" alt=\"A diagram of a diagram\" class=\"wp-image-45797\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc.jpg 552w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc-300x146.jpg 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><figcaption class=\"wp-element-caption\"><em><em>Figure 2. Confidential Computing\u2014Spectrum of Guarantees<\/em><\/em>.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Azure has the most comprehensive portfolio of <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/overview-azure-products\" target=\"_blank\" rel=\"noreferrer noopener\">confidential computing solutions<\/a>, including confidential virtual machines, containers, generative AI, and services like Azure Confidential Ledger, Azure Attestation, and Managed HSM\u2014each designed to protect code and data throughout its lifecycle using hardware-backed security.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"hardware-security-transparency\">Hardware Security Transparency<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/delivering-consistency-and-transparency-for-cloud-hardware-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Caliptra<\/strong><\/a>\u202fis a hardware root of trust that plays a critical role in securing devices. It anchors the chain of trust directly in silicon, establishing foundational security properties that support the integrity of higher-level features. This foundation provides workloads the ability to verify the code and configuration of the underlying platform, enabling workloads establish trust in the hardware platform.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Caliptra is a fully open-source silicon root of trust developed through a collaboration between Microsoft, AMD, Google, and NVIDIA. In April, we released Caliptra 2.0, which included Adams Bridge\u2014an open-source accelerator designed for post-quantum resilient cryptography. This integration made Caliptra the first open-source root of trust to feature hardened post-quantum cryptography, driving broader adoption across the hardware ecosystem.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/azureinfrastructureblog\/ocp-safe-a-systematic-hardware-security-appraisal-framework\/3955265\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Systematic Security Reviews<\/strong><\/a> play a critical role in protecting hardware infrastructure, which relies on both low-level hardware features and the firmware that runs on top of them. Ensuring firmware security involves rigorous code scanning, continuous security reviews, and hardware-based attestation.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Historically, Microsoft conducted these reviews internally. To enhance transparency and extend security assurance beyond Microsoft, we partnered with Google and the Open Compute Project in 2023 to establish <a href=\"https:\/\/www.opencompute.org\/projects\/ocp-safe-program\" target=\"_blank\" rel=\"noreferrer noopener\">OCP SAFE<\/a>\u2014a framework for systematic security reviews.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Under OCP SAFE, approved Security Review Providers (SRPs) perform independent evaluations and issue verifiable endorsements of a manufacturer\u2019s security compliance. These endorsements serve as trusted evidence, supporting secure device attestations and reinforcing confidence in the hardware supply chains.\u202f<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"enhancing-security-with-code-transparency-services\">Enhancing security with Code Transparency Services<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/overview\/azure\/security.codetransparency-readme?view=azure-dotnet-preview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Code Transparency Services<\/strong><\/a> (CTS) is an immutable ledger technology built to meet the standards of Supply Chain Integrity, Transparency, and Trust (<a href=\"https:\/\/scitt.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCITT<\/a>). It operates exclusively within\u202fconfidential computing environments, enhancing trust in Azure\u2019s hardware and firmware by ensuring that every component is verifiably secure\u202f.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">CTS addresses key challenges in firmware provenance, integrity, and auditability across both first-party and third-party supply chains. When paired with a\u202fsilicon root of trust like Caliptra, and supported by audits such as OCP-SAFE, CTS ensures that hardware and firmware are authorized, non-repudiable, and immutably auditable.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, CTS is a central component in Azure\u2019s confidential cloud services.\u202fIn addition to Azure\u2019s own usage, CTS will be available as a managed service\u2014allowing Azure customers to create and operate their own transparency service instances.\u202f<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"staying-secure-with-microsoft\">Staying secure with Microsoft<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft\u2019s Secure Future Initiative (SFI) provides a guiding framework for building secure and trustworthy cloud infrastructure. By embedding security into every layer\u2014from silicon to systems to services\u2014Azure takes a defense-in-depth approach to cloud security. Through innovations like Azure Boost, Azure Integrated HSM, and confidential computing, and through collaborative efforts such as Caliptra, OCP SAFE, and SCITT, Microsoft is not only securing today\u2019s workloads but also laying the foundation for a more secure and transparent future.\u202f<\/p>\n\n\n\n<aside class=\"cta-block cta-block--align-left cta-block--has-image wp-block-msx-cta\" data-bi-an=\"CTA Block\">\n\t<div class=\"cta-block__content\">\n\t\t\t\t\t<div class=\"cta-block__image-container\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-1024x575.jpg\" class=\"cta-block__image\" alt=\"A colorful lines on a white background\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-1024x575.jpg 1024w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-300x169.jpg 300w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-768x432.jpg 768w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1.jpg 1260w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t<\/div>\n\t\t\n\t\t<div class=\"cta-block__body\">\n\t\t\t<h2 class=\"cta-block__headline\">Azure Boost<\/h2>\n\t\t\t<p class=\"cta-block__text\">Explore next-generation Azure infrastructure.<\/p>\n\t\t\t\t\t\t\t<div class=\"cta-block__actions\">\n\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-machines\/boost\"\n\t\t\t\t\t\tclass=\"btn cta-block__link btn-link\"\n\t\t\t\t\t\t\t\t\t\t\t>\n\t\t\t\t\t\tLearn more &gt;\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/aside>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud.<\/p>\n","protected":false},"author":39,"featured_media":45686,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1467],"tags":[],"audience":[3055],"content-type":[1511],"product":[1455],"tech-community":[3004],"topic":[],"coauthors":[21,19,3280],"class_list":["post-45677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compute","audience-developers","content-type-best-practices","product-virtual-machines","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-alway-1680286580-106","review-flag-integ-1680286579-214","review-flag-lever-1680286579-649","review-flag-microsofts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-25T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T23:42:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1208\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mark Russinovich, Omar Khan, Bryan Kelly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Russinovich, Omar Khan, Bryan Kelly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/\",\"@type\":\"Person\",\"@name\":\"Mark Russinovich\"},{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/omar-khan\/\",\"@type\":\"Person\",\"@name\":\"Omar Khan\"},{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/bryan-kelly\/\",\"@type\":\"Person\",\"@name\":\"Bryan Kelly\"}],\"headline\":\"Protecting Azure Infrastructure from silicon to systems\",\"datePublished\":\"2025-08-25T15:00:00+00:00\",\"dateModified\":\"2025-08-25T23:42:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\"},\"wordCount\":1101,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp\",\"articleSection\":[\"Compute\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\",\"name\":\"Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp\",\"datePublished\":\"2025-08-25T15:00:00+00:00\",\"dateModified\":\"2025-08-25T23:42:43+00:00\",\"description\":\"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp\",\"width\":1208,\"height\":725,\"caption\":\"A stack of colorful hearts on a white plate\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compute\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting Azure Infrastructure from silicon to systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/dddfb06db704f28e44dc633b15e0d6ae\",\"name\":\"Brianna McGovern\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g5fc6a76f72449f78acaf535ec3e0c54f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g\",\"caption\":\"Brianna McGovern\"},\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/briannamcgovern\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog","description":"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog","og_description":"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2025-08-25T15:00:00+00:00","article_modified_time":"2025-08-25T23:42:43+00:00","og_image":[{"width":1208,"height":725,"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.png","type":"image\/png"}],"author":"Mark Russinovich, Omar Khan, Bryan Kelly","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Mark Russinovich, Omar Khan, Bryan Kelly","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/","@type":"Person","@name":"Mark Russinovich"},{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/omar-khan\/","@type":"Person","@name":"Omar Khan"},{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/bryan-kelly\/","@type":"Person","@name":"Bryan Kelly"}],"headline":"Protecting Azure Infrastructure from silicon to systems","datePublished":"2025-08-25T15:00:00+00:00","dateModified":"2025-08-25T23:42:43+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/"},"wordCount":1101,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp","articleSection":["Compute"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/","name":"Protecting Azure Infrastructure from silicon to systems | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp","datePublished":"2025-08-25T15:00:00+00:00","dateModified":"2025-08-25T23:42:43+00:00","description":"At Microsoft, secure design begins at the foundation of our computing stack\u2014the silicon level\u2014and extends through every layer of the cloud. Learn more.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-28.webp","width":1208,"height":725,"caption":"A stack of colorful hearts on a white plate"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-azure-infrastructure-from-silicon-to-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Compute","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/"},{"@type":"ListItem","position":3,"name":"Protecting Azure Infrastructure from silicon to systems"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/dddfb06db704f28e44dc633b15e0d6ae","name":"Brianna McGovern","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g5fc6a76f72449f78acaf535ec3e0c54f","url":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/471211b4d059ccb73aa3fda768b31973fb946424996c0376f7f0be3cb919d469?s=96&d=mm&r=g","caption":"Brianna McGovern"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/briannamcgovern\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/45677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=45677"}],"version-history":[{"count":23,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/45677\/revisions"}],"predecessor-version":[{"id":45804,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/45677\/revisions\/45804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media\/45686"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=45677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=45677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=45677"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=45677"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=45677"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=45677"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=45677"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=45677"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=45677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}