Skip to main content

Azure confidential computing

Increase data privacy by protecting data in use

Data privacy and secure multiparty data analytics

Increase data privacy and security surrounding business and consumer data by protecting data in use. Discover new opportunities by enabling multiparty data analytics and machine learning that combine datasets, keeping data private among participants. Take advantage of the broad range of confidential compute offerings Azure provides, including hardware, services, SDKs, and deployment tools.

Secure your sensitive and regulated data while it's being processed in the cloud. Azure confidential computing encrypts data in memory in hardware-based trusted execution environments and processes it only after the cloud environment is verified, helping prevent data access by cloud providers, administrators, and users. Build on top of secure hardware using familiar tools, software, and cloud infrastructure, or migrate your existing workloads and applications.

Combine datasets confidentially, without exposing your data to other contributing organizations. Benefit from confidential computing and great AI and machine learning insights. Upload encrypted data to a secure enclave in a virtual machine and perform algorithms on datasets from multiple sources.

Migrate to the cloud and keep full control of your data in a trusted execution environment. Specify the hardware and software that have access to your data and code, and verifiably enforce this guarantee. Customers retain control over their protected information so they can meet government regulations and compliance needs. Customize your confidential computing path using tools and solutions built in Azure, in open-source frameworks, and by independent software vendor partners.

Explore Azure confidential computing solution architectures

Confidential computing applies to various use cases for protecting data in use across industries such as government, financial services, and healthcare.

Healthcare platform confidential computing

Combine data confidentially using Azure confidential computing for AI-enhanced diagnostics.

Multiparty privacy-preserving computation

Share data, do computations, and arrive at a mutual result without divulging private data.

Related products

Confidential VMs with Application Enclaves

Create enclaves that protect data while processing in the CPU by keeping it encrypted and isolated in memory, thus protecting data from the operating system, hypervisors with escalated privileges, and Azure operators.

Confidential VMs

Easy way to deploy confidential workloads without requiring changes to existing applications or code

Confidential containers

Deploy and manage containerized applications more easily with a fully managed Kubernetes service

SQL Azure Always Encrypted

Expand confidential computing capabilities of Always Encrypted by enabling in-place encryption and richer confidential queries

Trusted launch

Improve the security of generation 2 VMs with trusted launch, protecting against advanced and persistent attack techniques

Azure confidential ledger

Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence

Microsoft Azure Attestation

Remotely verify the trustworthiness of a platform and the integrity of the binaries running inside it

Azure Key Vault M-HSM

Safeguard cryptographic keys and other secrets used by cloud apps and services

Azure confidential computing news and resources

Commitment to confidentiality

Microsoft is committed to transforming the cloud into the confidential cloud. As part of these efforts, Microsoft co-founded the Confidential Computing Consortium to democratize confidential computing and is accelerating innovation with a $20 billion investment.

Customers are doing great things with Azure confidential computing

Protecting data for millions of customers

"We utilize Azure confidential computing to provide scalable, secure environments for our services. Signal puts users first, and Azure helps us stay at the forefront of data protection with confidential computing."

Jim O'Leary, VP of Engineering, Signal

Personalizing offers while protecting privacy

"With Azure confidential computing, we can personalize offerings and protect privacy at the same time, creating exceptional digital experiences that clients can trust."

Eddy Ortiz, Vice President of Innovation and Solution Acceleration, Royal Bank of Canada
Royal Bank of Canada

Accelerating transactions while protecting data

"With hardware from Intel and Azure confidential computing, we've created a cryptocurrency that is fast, simple, and mobile-first; it just works."

Josh Goldbard, CEO, MobileCoin

Using privacy-preserving analytics in healthcare

"With this new technology, we expect to markedly reduce the time and cost, while also addressing data security concerns."

Michael Blum, MD, Associate Vice Chancellor for Informatics, UCSF
University of California San Francisco

Frequently asked questions

  • Confidential computing protects data in use. Confidential computing encrypts data in memory and processes it only after the cloud environment is verified to be a trusted execution environment, helping prevent data access by cloud operators, malicious admins, and privileged software.
  • As datasets grow because of AI and cloud scalability, scrutiny on how data can be exposed is increasing—from both a consumer data privacy perspective and a compliance and regulation perspective. In parallel, the complexity of cyberthreats and ongoing attacks means organizations must proactively ensure that data is protected throughout its lifecycle.
  • Confidential computing is expanding from regulated industries such as healthcare and financial services to the retail, manufacturing, and energy sectors. Every industry can benefit from it.
  • Common uses include reducing fraud and waste, anticorruption, antiterrorism, records and evidence management, intelligence analysis, global weapons systems and logistics management, vulnerable population protection (such as child exploitation and human trafficking), fighting money laundering, digital currencies, blockchain, transaction processing, customer analytics, proprietary analytics and algorithms, disease diagnostics, drug development, and contact tracing.
  • Blockchain technologies built on top of Azure confidential computing use hardware-based privacy to enable data confidentiality and secure computations.
  • Subscribe to the Azure Confidential Computing Blog so you don’t miss a thing.

Secure your workloads

Learn about confidential computing concepts, take tutorials, and create and deploy applications.

Deploy in Azure

Deploy a virtual machine from Azure with Intel SGX-enabled hardware using the app, available on Azure Marketplace.

Can we help you?