<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Confidential Computing topics</title>
    <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/bd-p/AzureConfidentialComputing</link>
    <description>Azure Confidential Computing topics</description>
    <pubDate>Thu, 23 Apr 2026 00:50:20 GMT</pubDate>
    <dc:creator>AzureConfidentialComputing</dc:creator>
    <dc:date>2026-04-23T00:50:20Z</dc:date>
    <item>
      <title>Plan Deploying Azure Managed HSM</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/plan-deploying-azure-managed-hsm/m-p/4357250#M49</link>
      <description>&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;What is Azure Managed HSM&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using&amp;nbsp;&lt;STRONG&gt;FIPS 140-2 Level 3&lt;/STRONG&gt;&amp;nbsp;validated HSMs. It is one of several&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/key-management" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;key management solutions in Azure&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Highly secure physical hardware&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;The Managed HSM service runs inside a trusted execution environment that's built on &lt;STRONG&gt;Intel Software Guard Extensions (Intel SGX)&lt;/STRONG&gt;. Intel SGX offers enhanced protection from internal and external attackers by using hardware isolation in enclaves that protect data in use.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Microsoft do regular Red Team/Blue Team exercises (&lt;A href="https://learn.microsoft.com/en-us/compliance/assurance/assurance-monitoring-and-testing" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;attack simulation&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Each instance is deployed in a different rack to ensure redundancy. Each server has a&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/fips/140/2/final" target="_blank" rel="noopener" data-linktype="external"&gt;FIPS 140-2 Level 3&lt;/A&gt; validated&lt;STRONG&gt; Marvell Liquid Security HSM Adapter&lt;/STRONG&gt; with multiple cryptographic cores. The cores are used to create fully isolated HSM partitions,&amp;nbsp;including fully&amp;nbsp;isolated&amp;nbsp;credentials, data storage, and access control.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;What is Security Domain&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;To operate, a managed HSM must have a security domain. The security domain is an encrypted blob file that contains artifacts like the HSM backup, user credentials, the signing key, and the data encryption key that's unique to the managed HSM&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Without the security domain, disaster recovery isn't possible. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. Protecting the security domain is therefore of the utmost importance for your business continuity, and to ensure that you aren't cryptographically locked out.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;The managed HSM initializes the security domain and encrypts it with the public keys that you provide by using &lt;STRONG&gt;Shamir's Secret Sharing Algorithm&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;After the security domain is downloaded, the managed HSM moves into an activated state and is ready for consumption.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;Managed HSM Deployment workflow&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Deployment options: CLI, PowerShell, ARM template&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Deployment workflow&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;Optional deployments&lt;/SPAN&gt;&lt;/H1&gt;
&lt;img /&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;Purge Protection and Soft Delete&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Following Diagram shows the difference between Soft delete and Purger projection option. Please note that managed HSM doesn't allow you to disable soft delete option. You can choose whether you want to enable or disable purge protection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;Purge Protection Disabled&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;Purge Protection Enabled&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;Plan&lt;/SPAN&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;What is the Motive?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; There are Three use cases can be considered while using managed HSM&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-10"&gt;&amp;nbsp;Encryption at rest for Azure Managed Services&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-10"&gt;&amp;nbsp;Storing keys that used to encrypt/ decrypt the parameters/object in self-developed application (SDKs are available)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-10"&gt;TLS offload for F5 and nginx (TLS offload libraries are available)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Which is the Primary Region&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Whether Secondary Region is required&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Plan for secondary region if Multi region Replication is required.&amp;nbsp; Managed HSM will be deployed in three physically separated racks and azure is providing 99.9% SLA. Please consider Multi region replication if you are planning for zero down time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Plan for RSA key pair to secure HSM Security Domain (Max 3, Min 10)&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Plan methods to secure Security Domain downloaded and Private Keys&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;Follow best practices such as offline encrypted storage/offline HSM, multi-person control, and geo-separation, Internet isolation while safeguarding the private key. Microsoft cannot assist in the event of key loss as Microsoft doesn’t have access to private keys.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Plan for Backup and restore&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-10"&gt;You can store back to Azure blob storage; with the help of security domain and private keys you can restore it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Plan for disaster recovery&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Which users, groups or service principal need to be assigned for azure RBAC and local RBAC&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Whether Purge protection is Required&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Logging is required or not?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Needed to be integrated with Azure policy or not?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Private connectivity is required or not?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Do you need to use SSL off load feature for F5 and nginx?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Do you need to configure Key rotation?&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN class="lia-text-color-15"&gt;Pricing Aspects&lt;/SPAN&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-15"&gt;Managed HSM pool cost per hour&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-15"&gt;Optional&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-15"&gt;Back up storage cost&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-15"&gt;Log storage cost &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-15"&gt;Multi Region Replication costs&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 10:29:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/plan-deploying-azure-managed-hsm/m-p/4357250#M49</guid>
      <dc:creator>Aaida_Aboobakkar</dc:creator>
      <dc:date>2024-12-16T10:29:51Z</dc:date>
    </item>
    <item>
      <title>Remote Attestation Attack on AMD SEV-SNP CVM in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/remote-attestation-attack-on-amd-sev-snp-cvm-in-azure/m-p/3867504#M15</link>
      <description>&lt;P&gt;Following the 1st scenario ("request in separate workload") on this page (&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-vms" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-vms&lt;/A&gt; ), after step 2, is it not possible for a malicious guest OS to replace a valid attestation report with another attestation report (from a SEV machine with a good OS) to mask its presence from a relying party? How is this mitigated?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2023 17:01:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/remote-attestation-attack-on-amd-sev-snp-cvm-in-azure/m-p/3867504#M15</guid>
      <dc:creator>Pradeep_Pappachan</dc:creator>
      <dc:date>2023-07-06T17:01:13Z</dc:date>
    </item>
    <item>
      <title>AZURE CONTAINER VS VIRTUAL MACHINE</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-container-vs-virtual-machine/m-p/3698595#M11</link>
      <description>&lt;P&gt;The scenario that Azure container instance can run under more than one OS be applied and how...?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example run Window and Linux OS which will be used to run different App or server within a container.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2022 00:38:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-container-vs-virtual-machine/m-p/3698595#M11</guid>
      <dc:creator>Noel34</dc:creator>
      <dc:date>2022-12-16T00:38:24Z</dc:date>
    </item>
  </channel>
</rss>

