<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Confidential Computing Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/bg-p/AzureConfidentialComputingBlog</link>
    <description>Azure Confidential Computing Blog articles</description>
    <pubDate>Sun, 12 Apr 2026 11:56:17 GMT</pubDate>
    <dc:creator>AzureConfidentialComputingBlog</dc:creator>
    <dc:date>2026-04-12T11:56:17Z</dc:date>
    <item>
      <title>Sovereignty in Azure Belgium Central: A Three-Layer Technical Deep Dive</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/sovereignty-in-azure-belgium-central-a-three-layer-technical/ba-p/4506936</link>
      <description>&lt;P data-line="2"&gt;When Belgium Central went live in November 2025, it marked the launch of a new Azure region for Belgian organizations operating in the EU. For many scenarios, it enables customers to run workloads in-country and apply technical controls that can support sovereignty requirements.&lt;/P&gt;
&lt;P data-line="4"&gt;But "sovereignty" is one of those words that means different things to different people. So, let's break it down into something more tangible.&lt;/P&gt;
&lt;P data-line="6"&gt;In this post, we'll walk through sovereignty in Azure Belgium Central using three standardized technical layers. Think of them as concentric rings of protection around your data:&lt;/P&gt;
&lt;UL data-line="8"&gt;
&lt;LI data-line="8"&gt;&lt;STRONG&gt;Layer 1: Data Residency &amp;amp; Locality.&lt;/STRONG&gt;&amp;nbsp;Where your data physically lives and how it behaves during failure.&lt;/LI&gt;
&lt;LI data-line="9"&gt;&lt;STRONG&gt;Layer 2: Encryption at Rest &amp;amp; In Transit.&lt;/STRONG&gt;&amp;nbsp;How data is protected and who holds the keys.&lt;/LI&gt;
&lt;LI data-line="10"&gt;&lt;STRONG&gt;Layer 3: Confidential Computing.&lt;/STRONG&gt;&amp;nbsp;How data is protected&amp;nbsp;&lt;EM&gt;while being processed&lt;/EM&gt;&amp;nbsp;in memory.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-line="12"&gt;Each layer builds on the previous one. Together, they form a comprehensive sovereignty posture. Let's find out what that looks like in practice.&lt;/P&gt;
&lt;P data-line="14"&gt;&lt;STRONG&gt;Layer 1: Data Residency &amp;amp; Locality&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="16"&gt;This layer answers the most fundamental sovereignty question:&amp;nbsp;&lt;EM&gt;where is my data, and does it stay there?&lt;/EM&gt;&lt;/P&gt;
&lt;P data-line="18"&gt;&lt;STRONG&gt;In-Country Storage&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="20"&gt;For regionally deployed Azure services, customer data at rest is stored in the selected Azure region. In Belgium Central, this means data at rest for supported services is stored in Belgium. Microsoft indicates the region’s datacenters are located in the Brussels area. When you deploy a resource with location = "belgiumcentral" in Terraform or location: 'belgiumcentral' in Bicep, you’re selecting that Azure region for the resource.&lt;/P&gt;
&lt;P data-line="22"&gt;This matters for organizations bound by Belgian or EU data residency requirements, and it matters for public sector customers who need assurance that sensitive data doesn't cross national borders without explicit action.&lt;/P&gt;
&lt;P data-line="24"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://www.microsoft.com/en-be/digitalambetion/datacenter" target="_blank" rel="noopener" data-href="https://www.microsoft.com/en-be/digitalambetion/datacenter"&gt;Microsoft Digital AmBEtion (microsoft.com/en-be)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="26"&gt;&lt;STRONG&gt;Three Availability Zones&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="28"&gt;Belgium Central supports Availability Zones. Availability Zones are physically separate locations within an Azure region and are designed with independent power, cooling, and networking. This lets you deploy zone-redundant architectures (for example, spreading VMs, databases, and storage across zones) for high availability while keeping resources in the same Azure region.&lt;/P&gt;
&lt;P data-line="30"&gt;Availability Zones within a region are connected by high-bandwidth, low-latency networking designed to support zone-redundant services and architectures. Actual latency depends on workload placement and architecture and should be validated for your scenario.&lt;/P&gt;
&lt;P data-line="32"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/discussions/beluxpartnerzone/the-abc-of-azure-belgium-central/3808027" target="_blank" rel="noopener" data-href="https://techcommunity.microsoft.com/discussions/beluxpartnerzone/the-abc-of-azure-belgium-central/3808027"&gt;The ABC of Azure Belgium Central (Microsoft Community Hub)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="34"&gt;&lt;STRONG&gt;Non-Paired Region: A Sovereignty Feature, Not a Limitation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="36"&gt;Azure Belgium Central is a&amp;nbsp;&lt;STRONG&gt;non-paired region&lt;/STRONG&gt;. For services that rely on region pairing for automatic geo-replication, behavior and options can differ from non-paired regions. Customers can configure cross-region disaster recovery explicitly and choose a target region based on their requirements.&lt;/P&gt;
&lt;P data-line="38"&gt;From a sovereignty perspective, some customers may prefer this model because cross-region replication and secondary data locations are customer-selected when configured. Replication and failover capabilities are service-specific, and customers should confirm the data residency and replication behavior for the services they use.&lt;/P&gt;
&lt;P data-line="40"&gt;Depending on the service and redundancy option, some geo-redundant features (for example, Geo-Redundant Storage (GRS) for Azure Storage) may not be available in non-paired regions. Many designs use&amp;nbsp;&lt;STRONG&gt;Zone-Redundant Storage (ZRS)&lt;/STRONG&gt;&amp;nbsp;for in-region redundancy across Availability Zones. For cross-region replication, options such as object replication may be used where supported, with the destination region selected by the customer.&lt;/P&gt;
&lt;P data-line="42"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/reliability/regions-paired" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/reliability/regions-paired"&gt;Azure region pairs and nonpaired regions (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="44"&gt;&lt;STRONG&gt;What This Means Architecturally&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="46"&gt;When designing for Belgium Central, customers may consider:&lt;/P&gt;
&lt;UL data-line="48"&gt;
&lt;LI data-line="48"&gt;&lt;STRONG&gt;Intra-region redundancy&lt;/STRONG&gt;&amp;nbsp;via Availability Zones (for example, ZRS and zone-redundant deployments), where supported.&lt;/LI&gt;
&lt;LI data-line="49"&gt;&lt;STRONG&gt;Cross-region disaster recovery&lt;/STRONG&gt;&amp;nbsp;when explicitly configured, with a customer-chosen secondary region.&lt;/LI&gt;
&lt;LI data-line="50"&gt;&lt;STRONG&gt;Replication behavior&lt;/STRONG&gt;&amp;nbsp;that is service-dependent; customers should validate which services replicate within a region, across zones, or across regions, and what configuration is required.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-line="52"&gt;&lt;STRONG&gt;Layer 2: Encryption at Rest &amp;amp; In Transit&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="54"&gt;Layer 1 keeps your data in Belgium. Layer 2 makes sure that even if someone gained physical access to the underlying infrastructure, they'd find nothing readable.&lt;/P&gt;
&lt;P data-line="56"&gt;&lt;STRONG&gt;Encryption at Rest: Platform-Managed by Default&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="58"&gt;By default, all data stored at rest in Azure is encrypted to ensure security and compliance. Storage accounts, managed disks, databases: all use AES-256 encryption with Microsoft-managed keys out of the box. You don't have to configure anything to get this baseline protection.&lt;/P&gt;
&lt;P data-line="60"&gt;But for sovereignty scenarios, "Microsoft holds the keys" might not be enough. Data at rest is encrypted by default with platform managed keys but double encryption is possible with an extra layer of encryption with customer managed keys (CMK).&lt;/P&gt;
&lt;P data-line="62"&gt;&lt;STRONG&gt;Source:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption"&gt;Double encryption in Azure (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="64"&gt;&lt;STRONG&gt;Customer-Managed Keys (CMK): You Hold the Keys&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="66"&gt;Azure services in Belgium Central support&amp;nbsp;&lt;STRONG&gt;Customer-Managed Keys (CMK)&lt;/STRONG&gt;&amp;nbsp;through Azure Key Vault. This shifts key ownership from Microsoft to you. You generate, rotate, and revoke keys on your own schedule. Azure services reference your key in Key Vault for encrypt/decrypt operations, but the key itself is under your control.&lt;/P&gt;
&lt;P data-line="68"&gt;This applies to a broad range of services: VM disk encryption, storage account encryption, Azure SQL Transparent Data Encryption, and more.&lt;/P&gt;
&lt;P data-line="70"&gt;But not all key storage is created equal. Azure offers three tiers of key management in Belgium Central, and the differences matter for sovereignty:&lt;/P&gt;
&lt;P data-line="72"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview"&gt;Azure encryption overview (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="74"&gt;&lt;STRONG&gt;Key Vault Standard: Software-Protected Keys&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="76"&gt;The entry-level option. Keys are stored encrypted in software, protected by Microsoft's infrastructure, but not in dedicated HSM hardware. This is the entry-level option: software-protected keys stored in a vault, without dedicated HSM hardware. For many general-purpose workloads where regulatory demands don't mandate hardware key protection, Standard is cost-effective and fully functional for CMK scenarios.&lt;/P&gt;
&lt;P data-line="78"&gt;&lt;STRONG&gt;Key Vault Premium: HSM-Backed Keys (Multi-Tenant)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="80"&gt;Premium includes everything in Standard plus support for&amp;nbsp;&lt;STRONG&gt;HSM-protected keys&lt;/STRONG&gt;. When you create an HSM-backed key in a Premium vault, the key material lives inside Microsoft-managed Hardware Security Modules rather than in software. The HSM hardware is shared (multi-tenant, logically isolated per customer), but the key material is processed and stored within certified HSM devices.&lt;/P&gt;
&lt;P data-line="82"&gt;Microsoft documentation describes the compliance and validation posture of Key Vault and HSM-backed keys, including FIPS validation details that may vary by hardware generation, region, and service configuration. Customers should refer to the current product documentation and compliance listings for the specific SKU and region in scope.&lt;/P&gt;
&lt;P data-line="84"&gt;For many scenarios, Key Vault Premium provides HSM-backed key options in a multi-tenant service model and is priced differently than Key Vault Standard and Managed HSM. The right choice depends on regulatory requirements, operational model, and cost considerations.&lt;/P&gt;
&lt;P data-line="86"&gt;&lt;STRONG&gt;Managed HSM: Single-Tenant, Maximum Isolation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="88"&gt;For the highest level of key sovereignty, Azure Key Vault&amp;nbsp;&lt;STRONG&gt;Managed HSM&lt;/STRONG&gt;&amp;nbsp;provides a single-tenant key management service backed by FIPS 140-3 Level 3 validated hardware. Unlike Key Vault Premium (where HSM-backed keys share a multi-tenant HSM infrastructure), a Managed HSM pool gives you a dedicated, cryptographically isolated HSM environment with your own security domain.&lt;/P&gt;
&lt;P data-line="90"&gt;Key facts about Managed HSM that matter for sovereignty:&lt;/P&gt;
&lt;UL data-line="92"&gt;
&lt;LI data-line="92"&gt;&lt;STRONG&gt;Compliance / validation&lt;/STRONG&gt;: Managed HSM uses dedicated hardware security modules. Refer to current Microsoft documentation for FIPS validation level and applicability for your region and SKU.&lt;/LI&gt;
&lt;LI data-line="93"&gt;&lt;STRONG&gt;Regional deployment&lt;/STRONG&gt;: Managed HSM is deployed to an Azure region. Customers should validate data residency and any service-specific data handling behavior for their workload and compliance needs.&lt;/LI&gt;
&lt;LI data-line="94"&gt;&lt;STRONG&gt;Security domain&lt;/STRONG&gt;: Customers download and control the security domain (a cryptographic backup of HSM credentials), protected using customer-controlled keys. See product documentation for the shared responsibility model and operational details.&lt;/LI&gt;
&lt;LI data-line="95"&gt;&lt;STRONG&gt;Access control&lt;/STRONG&gt;: Managed HSM provides role-based access controls for key operations. Customers should review the authorization model and administrative boundaries described in the documentation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-line="97"&gt;Managed HSM has a different pricing and operational model than Key Vault (for example, pool-based billing and additional operational steps). It is typically considered when requirements call for dedicated HSM resources, security domain control, or specific compliance needs beyond a shared HSM service model.&lt;/P&gt;
&lt;P data-line="99"&gt;&lt;STRONG&gt;Choosing the Right Tier&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="101"&gt;&lt;STRONG&gt;Managed HSM&lt;/STRONG&gt;&amp;nbsp;is typically considered when requirements call for dedicated HSM resources, security domain control, or administrative separation beyond a shared HSM service model.&lt;/P&gt;
&lt;P data-line="103"&gt;&lt;STRONG&gt;Key Vault Standard&lt;/STRONG&gt;&amp;nbsp;can be a fit for development/test or scenarios where software-protected keys meet your requirements. Key Vault and Managed HSM capabilities are available in Azure Belgium Central, but customers should verify current product, SKU, and service availability by region and validate service-specific data residency behavior for their workload.&lt;/P&gt;
&lt;P data-line="105"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/overview"&gt;Azure Key Vault Managed HSM overview (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/managed-hsm-technical-details" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/managed-hsm-technical-details"&gt;Managed HSM technical details (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys"&gt;About keys (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="107"&gt;&lt;STRONG&gt;Encryption in Transit: MACsec + TLS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="109"&gt;On the wire, Azure provides two layers of transit encryption:&lt;/P&gt;
&lt;OL data-line="111"&gt;
&lt;LI data-line="111"&gt;&lt;STRONG&gt;IEEE 802.1AE MACsec.&lt;/STRONG&gt; our documentation describes the use of MACsec on portions of the Azure backbone for in-network encryption on supported links. Availability and coverage can vary by scenario; customers should refer to current documentation for details.&lt;/LI&gt;
&lt;LI data-line="112"&gt;&lt;STRONG&gt;TLS.&lt;/STRONG&gt;&amp;nbsp;Azure services support TLS for client-to-service connections. Supported TLS versions and configuration requirements vary by service; customers should validate the specific service and endpoint configuration they use.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-line="114"&gt;Together, these mechanisms help protect data in transit at different layers, depending on the service and network path used.&lt;/P&gt;
&lt;P data-line="116"&gt;&lt;STRONG&gt;Layer 2 Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;STRONG&gt;Concern&lt;/STRONG&gt;&lt;/th&gt;&lt;th&gt;&lt;STRONG&gt;Mechanism&lt;/STRONG&gt;&lt;/th&gt;&lt;th&gt;&lt;STRONG&gt;Key Detail&lt;/STRONG&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Data at rest (default)&lt;/td&gt;&lt;td&gt;AES-256, platform-managed keys&lt;/td&gt;&lt;td&gt;Automatic, no config needed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CMK: software keys&lt;/td&gt;&lt;td&gt;Key Vault Standard&lt;/td&gt;&lt;td&gt;FIPS 140-2 L1, multi-tenant, lowest cost&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CMK: HSM-backed keys&lt;/td&gt;&lt;td&gt;Key Vault Premium&lt;/td&gt;&lt;td&gt;FIPS 140-3 L3 (new hardware), multi-tenant&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CMK: dedicated HSM&lt;/td&gt;&lt;td&gt;Managed HSM&lt;/td&gt;&lt;td&gt;FIPS 140-3 L3, single-tenant, security domain&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Data in transit (infra)&lt;/td&gt;&lt;td&gt;MACsec (IEEE 802.1AE)&lt;/td&gt;&lt;td&gt;Coverage varies by link/scenario; refer to current documentation&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Data in transit (client)&lt;/td&gt;&lt;td&gt;TLS 1.2+&lt;/td&gt;&lt;td&gt;Supported versions vary by service and configuration&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P data-line="127"&gt;&lt;STRONG&gt;Trusted Launch and protection of data at rest&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="129"&gt;Trusted Launch is a security feature available for Azure Virtual Machines that helps protect against advanced threats such as rootkits and bootkits. It enables secure boot and virtual Trusted Platform Module (vTPM) on supported VM sizes, ensuring that only signed and verified operating system binaries are loaded during startup. This provides enhanced integrity for the boot process and helps organizations meet compliance requirements for workloads running in the cloud.&lt;/P&gt;
&lt;P data-line="131"&gt;By leveraging Trusted Launch, customers can monitor and attest to the health of their VMs at boot time, making it easier to detect and respond to potential tampering or compromise. The combination of secure boot and vTPM strengthens the security posture of Azure VMs, offering greater protection for sensitive workloads.&lt;/P&gt;
&lt;P data-line="133"&gt;Additionally, Trusted Launch strengthens data‑at‑rest protection by isolating encryption keys in a platform‑managed vTPM, binding key release to verified boot integrity, and preventing offline or unauthorized reuse of encrypted disks, even by privileged administrators.&lt;/P&gt;
&lt;P data-line="135"&gt;&lt;STRONG&gt;Source:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/trusted-launch" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/virtual-machines/trusted-launch"&gt;Trusted Launch for Azure virtual machines&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="137"&gt;&lt;STRONG&gt;Layer 3: Confidential Computing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="139"&gt;Layers 1 and 2 protect data where it lives and while it moves. Layer 3 closes the final gap: protecting data&amp;nbsp;&lt;STRONG&gt;while it's being processed in memory&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-line="141"&gt;This is the domain of Azure Confidential Computing, and it's where things get genuinely interesting from a sovereignty perspective. Azure Confidential Computing is designed to help reduce certain operator-access risks by using hardware-backed isolation for data while it is being processed in memory.&lt;/P&gt;
&lt;P data-line="143"&gt;&lt;STRONG&gt;Confidential Virtual Machines&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="145"&gt;Azure Confidential VMs use specialized hardware to create a&amp;nbsp;&lt;STRONG&gt;Trusted Execution Environment (TEE)&lt;/STRONG&gt;&amp;nbsp;at the VM level. Two technology families are available:&lt;/P&gt;
&lt;P data-line="147"&gt;&lt;STRONG&gt;AMD SEV-SNP (DCasv6 / DCadsv6 / ECasv6 / ECadsv6 series)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="149"&gt;These VMs use AMD's Secure Encrypted Virtualization with Secure Nested Paging. The key properties:&lt;/P&gt;
&lt;UL data-line="151"&gt;
&lt;LI data-line="151"&gt;The VM's memory is encrypted with keys generated by the AMD processor. These keys are designed to remain within the CPU boundary.&lt;/LI&gt;
&lt;LI data-line="152"&gt;The platform is designed to help protect VM memory and state from access by the hypervisor and host management code.&lt;/LI&gt;
&lt;LI data-line="153"&gt;Supports Confidential OS disk encryption with either platform-managed keys (PMK) or customer-managed keys (CMK), binding encryption to the VM's virtual TPM on supported configurations.&lt;/LI&gt;
&lt;LI data-line="154"&gt;Each VM uses a virtual TPM (vTPM) for key sealing and integrity measurement.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-line="156"&gt;&lt;STRONG&gt;Intel TDX (DCesv6 / DCedsv6 series)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="160"&gt;These VMs use Intel Trust Domain Extensions, which provides full VM memory encryption and integrity protection:&lt;/P&gt;
&lt;UL data-line="162"&gt;
&lt;LI data-line="162"&gt;The entire VM runs inside a hardware-isolated Trust Domain (TD), designed to help protect data in memory from the hypervisor and host management code.&lt;/LI&gt;
&lt;LI data-line="163"&gt;Memory encryption and integrity are enforced by the Intel CPU using dedicated encryption keys per TD.&lt;/LI&gt;
&lt;LI data-line="164"&gt;Supports Confidential OS disk encryption (PMK/CMK) and vTPM integration on supported configurations.&lt;/LI&gt;
&lt;LI data-line="165"&gt;Additional performance characteristics and hardware details vary by VM size and generation; refer to the current VM size documentation for specifics.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The AMD SEV-SNP VM families are currently available in Preview in Azure Belgium Central, with GA planned. The Intel SKU is&amp;nbsp;&lt;STRONG&gt;not currently available in Azure Belgium Central.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="167"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview"&gt;About Azure confidential VMs (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/general-purpose/dc-family" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/general-purpose/dc-family"&gt;DC family VM sizes (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/azureconfidentialcomputingblog/announcing-general-availability-of-azure-intel%C2%AE-tdx-confidential-vms/4495693" target="_blank" rel="noopener" data-href="https://techcommunity.microsoft.com/blog/azureconfidentialcomputingblog/announcing-general-availability-of-azure-intel%C2%AE-tdx-confidential-vms/4495693"&gt;Intel TDX confidential VMs GA announcement (techcommunity.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="169"&gt;&lt;STRONG&gt;Azure Attestation: Trust, but Verify&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="171"&gt;Confidential computing isn't just about encryption. It's about&amp;nbsp;&lt;STRONG&gt;verifiable trust&lt;/STRONG&gt;. Azure Attestation is a free service that validates the integrity of the hardware and firmware environment before your workload runs.&lt;/P&gt;
&lt;P data-line="173"&gt;Here's how platform attestation works for AMD SEV-SNP and Intel TDX Confidential VMs:&lt;/P&gt;
&lt;OL data-line="175"&gt;
&lt;LI data-line="175"&gt;When a confidential VM boots, the hardware generates an&amp;nbsp;&lt;STRONG&gt;attestation report&lt;/STRONG&gt;&amp;nbsp;containing firmware and platform measurements (an SNP report for AMD, a TDX quote for Intel).&lt;/LI&gt;
&lt;LI data-line="176"&gt;Azure Attestation evaluates this report against expected values.&lt;/LI&gt;
&lt;LI data-line="177"&gt;Only if the platform passes attestation are decryption keys released from your Key Vault or Managed HSM.&lt;/LI&gt;
&lt;LI data-line="178"&gt;These keys unlock the vTPM state and the encrypted OS disk, and the VM starts.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-line="180"&gt;If the platform does not meet the attestation policy, key release can be blocked and the VM may not start, depending on configuration.&lt;/P&gt;
&lt;P data-line="182"&gt;In addition to platform attestation, customers can perform&amp;nbsp;&lt;STRONG&gt;guest-initiated attestation&lt;/STRONG&gt;&amp;nbsp;from within the CVM to independently verify the VM's measured hardware and runtime state. This allows applications running inside a confidential VM to obtain an attestation token at runtime, which they can present to relying parties (like a key vault or external service) to prove they are executing in a genuine TEE.&lt;/P&gt;
&lt;P data-line="184"&gt;This can help reduce reliance on implicit trust by providing cryptographic evidence about the environment at boot and, where implemented, at runtime.&lt;/P&gt;
&lt;P data-line="186"&gt;Azure Attestation availability is region-dependent; customers should verify current availability in Belgium Central and select the appropriate provider configuration for their scenario.&lt;/P&gt;
&lt;P data-line="188"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/attestation/overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/attestation/overview"&gt;Azure Attestation overview (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions"&gt;Attestation types and scenarios (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="190"&gt;&lt;STRONG&gt;Confidential Computing on AKS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="192"&gt;For containerized workloads, Azure Kubernetes Service supports confidential computing through&amp;nbsp;&lt;STRONG&gt;confidential node pools&lt;/STRONG&gt;. You can add node pools backed by confidential VMs alongside regular node pools in the same cluster.&lt;/P&gt;
&lt;P data-line="194"&gt;You can add AKS node pools using supported confidential VM sizes. In this model, the worker node runs as a confidential VM, so the node’s memory is hardware-protected from the host and hypervisor. Containers scheduled onto that node can run without application refactoring, but the added protection is at the VM/node level. Exact region and SKU availability should be validated for the sizes you plan to deploy.&lt;/P&gt;
&lt;P data-line="196"&gt;AKS support for confidential VM sizes today includes AMD SEV-SNP with Intel TDX on the roadmap; customers should validate region and SKU availability for the exact AKS node pool sizes they intend to use.&lt;/P&gt;
&lt;P&gt;Azure Attestation can be integrated into confidential computing architectures on AKS to verify the trust state of nodes or workloads before secrets are released. This is typically implemented at the workload or confidential container level and is not enforced automatically for all AKS pods.&lt;/P&gt;
&lt;P data-line="200"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks"&gt;Confidential VM node pools on AKS (learn.microsoft.com)&lt;/A&gt;,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/aks/use-cvm" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/aks/use-cvm"&gt;Use CVM in AKS (learn.microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P data-line="202"&gt;&lt;STRONG&gt;The Full Data Protection Chain&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="204"&gt;When you combine all three layers, the protection chain when using confidential VMs in Belgium Central looks like this:&lt;/P&gt;
&lt;P data-line="206"&gt;[Confidential VM boots]&lt;/P&gt;
&lt;P data-line="208"&gt;→ Hardware TEE encrypts VM memory (SEV-SNP or TDX, CPU-generated keys)&lt;/P&gt;
&lt;P data-line="210"&gt;→ Azure Attestation validates platform report (SNP report or TDX quote)&lt;/P&gt;
&lt;P data-line="212"&gt;→ Key Vault (Premium) or Managed HSM conditionally releases disk decryption keys&lt;/P&gt;
&lt;P data-line="214"&gt;→ vTPM state unlocked → OS disk decrypted&lt;/P&gt;
&lt;P data-line="216"&gt;→ VM starts&lt;/P&gt;
&lt;P data-line="218"&gt;→ Data in memory: encrypted and isolated by hardware TEE (Layer 3 – Confidential Compute)&lt;/P&gt;
&lt;P data-line="220"&gt;→ Data at rest: encrypted by CMK from Key Vault / Managed HSM (Layer 2 – Encryption)&lt;/P&gt;
&lt;P data-line="222"&gt;→ Data in transit: protected using TLS (and MACsec on selected Azure backbone links) (Layer 2 – Encryption)&lt;/P&gt;
&lt;P data-line="224"&gt;→ Data stored and processed in Belgium Central where supported and as configured (Layer 1 – Data Residency)&lt;/P&gt;
&lt;P data-line="226"&gt;These controls are designed to reduce operator-access risk through hardware-backed isolation, attestation, and customer-controlled key options. The exact protection level depends on the selected service, SKU, region, and configuration&lt;/P&gt;
&lt;P data-line="228"&gt;&lt;STRONG&gt;Bringing It All Together&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="230"&gt;Here's the sovereignty stack for Azure Belgium Central in one view:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;STRONG&gt;Layer&lt;/STRONG&gt;&lt;/th&gt;&lt;th&gt;&lt;STRONG&gt;What It Protects&lt;/STRONG&gt;&lt;/th&gt;&lt;th&gt;&lt;STRONG&gt;Key Technologies&lt;/STRONG&gt;&lt;/th&gt;&lt;th&gt;&lt;STRONG&gt;Availability in Belgium Central&lt;/STRONG&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;1: Data Residency&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;Where data lives&lt;/td&gt;&lt;td&gt;3 AZs, non-paired region, ZRS&lt;/td&gt;&lt;td&gt;GA. No cross-border replication by default.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;2: Encryption&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;Data at rest + in transit&lt;/td&gt;&lt;td&gt;CMK, Key Vault (Std/Premium), Managed HSM, MACsec, TLS&lt;/td&gt;&lt;td&gt;GA. All three Key Vault tiers available in-region.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;3: Confidential Computing&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;Data in use (memory)&lt;/td&gt;&lt;td&gt;SEV-SNP / TDX VMs, Attestation, AKS&lt;/td&gt;&lt;td&gt;Availability varies by SKU and region. Confirm confidential VM options (AMD/Intel), attestation, and AKS confidential node support for Belgium Central for the exact sizes you plan to use.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P data-line="238"&gt;Each layer is independently valuable, but the combination can help customers implement stronger technical controls for data residency, encryption, and in-use protection—subject to the specific services, SKUs, regions, and configurations selected.&lt;/P&gt;
&lt;P data-line="240"&gt;&lt;STRONG&gt;A Few Honest Caveats&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-line="242"&gt;Because I want to keep this honest and useful:&lt;/P&gt;
&lt;OL data-line="244"&gt;
&lt;LI data-line="244"&gt;&lt;STRONG&gt;Check regional availability for specific SKUs.&lt;/STRONG&gt; Availability can vary by region and can change over time. Before finalizing an architecture, confirm that the exact services and SKUs you plan to use are available in Azure Belgium Central (for example, specific confidential VM sizes, Azure Attestation, Managed HSM, and AKS node pool sizes) using the Azure products-by-region information.&lt;/LI&gt;
&lt;LI data-line="245"&gt;&lt;STRONG&gt;Sovereignty is not just technical.&lt;/STRONG&gt;&amp;nbsp;The layers above cover technical sovereignty, where data is, who encrypts it, and who can access it in memory. Legal sovereignty (jurisdiction, government access requests, contractual commitments) is a separate conversation.&lt;/LI&gt;
&lt;LI data-line="246"&gt;&lt;STRONG&gt;Managed HSM has different pricing and operational characteristics.&lt;/STRONG&gt;&amp;nbsp;Managed HSM uses pool-based billing and may require additional operational steps compared to Key Vault. Key Vault Premium supports HSM-backed keys in a multi-tenant model, which may be sufficient for many CMK scenarios. Select the option that meets your compliance and operational requirements.&lt;/LI&gt;
&lt;LI data-line="247"&gt;&lt;STRONG&gt;Confidential VM capabilities and integrations vary by VM size, generation, and feature.&lt;/STRONG&gt;&amp;nbsp;Some scenarios and integrations (for example, certain backup/DR options, live migration behaviors, accelerated networking, or resize paths) may be limited for specific confidential VM offerings. Validate the current limitations and supported features for the exact confidential VM series and region you plan to use, and plan DR based on the services and mechanisms supported for your scenario. &lt;STRONG&gt;These limitations are being actively worked on.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-line="249"&gt;&lt;STRONG&gt;Disclosure:&lt;/STRONG&gt;&amp;nbsp;Disaster recovery (DR) design and configuration remain a customer responsibility, including selecting a secondary region and implementing replication, failover, testing, and operational runbooks. Azure service availability and specific features can vary by region, SKU, and deployment model, and may change over time. Replication scope and behavior (in-zone, zone-redundant, regional, or cross-region) are service-specific and depend on the redundancy option selected; validate the data residency and replication details for each service in your architecture.&lt;/P&gt;
&lt;P data-line="251"&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-line="253"&gt;
&lt;LI data-line="253"&gt;&lt;A href="https://www.microsoft.com/en-be/digitalambetion/datacenter" target="_blank" rel="noopener" data-href="https://www.microsoft.com/en-be/digitalambetion/datacenter"&gt;Microsoft Digital AmBEtion (microsoft.com/en-be)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="254"&gt;&lt;A href="https://techcommunity.microsoft.com/discussions/beluxpartnerzone/the-abc-of-azure-belgium-central/3808027" target="_blank" rel="noopener" data-href="https://techcommunity.microsoft.com/discussions/beluxpartnerzone/the-abc-of-azure-belgium-central/3808027"&gt;The ABC of Azure Belgium Central (Microsoft Community Hub)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="255"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/reliability/regions-paired" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/reliability/regions-paired"&gt;Azure region pairs and nonpaired regions (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="256"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview"&gt;Azure encryption overview (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="257"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption"&gt;Double encryption in Azure (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="258"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/overview"&gt;Azure Key Vault Managed HSM overview (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="259"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/managed-hsm-technical-details" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/managed-hsm-technical-details"&gt;Managed HSM technical details (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="260"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys"&gt;About keys (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="261"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview"&gt;About Azure confidential VMs (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="262"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/general-purpose/dc-family" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/general-purpose/dc-family"&gt;DC family VM sizes (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="263"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-faq" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-faq"&gt;Confidential VM FAQ (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="264"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azureconfidentialcomputingblog/announcing-general-availability-of-azure-intel%C2%AE-tdx-confidential-vms/4495693" target="_blank" rel="noopener" data-href="https://techcommunity.microsoft.com/blog/azureconfidentialcomputingblog/announcing-general-availability-of-azure-intel%C2%AE-tdx-confidential-vms/4495693"&gt;Intel TDX confidential VMs GA announcement (techcommunity.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="265"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks"&gt;Confidential VM node pools on AKS (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="266"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/aks/use-cvm" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/aks/use-cvm"&gt;Use CVM in AKS (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="267"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/attestation/overview" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/attestation/overview"&gt;Azure Attestation overview (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="268"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions"&gt;Attestation types and scenarios (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="269"&gt;&lt;A href="https://azure.microsoft.com/en-us/explore/global-infrastructure/products-by-region/" target="_blank" rel="noopener" data-href="https://azure.microsoft.com/en-us/explore/global-infrastructure/products-by-region/"&gt;Azure products by region (azure.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="270"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/trusted-launch" target="_blank" rel="noopener" data-href="https://learn.microsoft.com/en-us/azure/virtual-machines/trusted-launch"&gt;Trusted Launch for Azure virtual machines (learn.microsoft.com)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/sovereignty-in-azure-belgium-central-a-three-layer-technical/ba-p/4506936</guid>
      <dc:creator>wesback</dc:creator>
      <dc:date>2026-04-09T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Announcing general availability of Azure Intel® TDX confidential VMs</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-general-availability-of-azure-intel-tdx-confidential/ba-p/4495693</link>
      <description>&lt;P&gt;We’re excited to announce the general availability of Azure’s next generation of confidential virtual machines, powered by 5th Gen Intel® Xeon® processors with &lt;A href="https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/trust-domain-extensions.html" target="_blank" rel="noopener"&gt;Intel® Trust Domain Extensions&lt;/A&gt; (Intel® TDX). These new confidential VMs make it easier than ever for organizations to move their most sensitive workloads to the cloud—without requiring any application code changes. Available today for production deployments across both general-purpose (DCesv6, DCedsv6) and memory-optimized (ECesv6, ECedsv6) VM series, this release delivers a powerful combination of performance, scalability, and hardware-enforced security, enabling customers to innovate with confidence on Azure.&lt;/P&gt;
&lt;P&gt;By combining hardware-enforced isolation, cryptographic attestation, and built-in support for Intel® Advanced Matrix Extensions (Intel® AMX), Intel® TDX confidential VMs allow Azure customers to&amp;nbsp;accelerate confidential AI scenarios, protect models and weights, and even collaborate across organizations without exposing confidential data.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For Azure customers, this generation of Intel-based confidential VMs provides additional assurance for one of the last major barriers to cloud adoption for sensitive and high-value workloads. It allows organizations to take advantage of Azure’s global scale, elasticity, and rich ecosystem while helping to prevent unauthorized access to data in-use, even from the cloud operator. By combining hardware-enforced isolation and cryptographic attestation, customers can deploy sensitive and/or regulated workloads, protect intellectual property, and run confidential AI pipelines with greater assurance and fewer architectural compromises. The result is faster cloud adoption, simpler compliance, and accelerated innovation —without sacrificing control or security.&lt;/P&gt;
&lt;P&gt;With Azure Intel® TDX confidential VMs, customers can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Protect data and models while in use&lt;/STRONG&gt; with hardware-enforced isolation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Achieve significantly lower latency and higher throughput&lt;/STRONG&gt; with NVMe local storage&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy existing applications without code changes&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Verify integrity and workload integrity&lt;/STRONG&gt; through cryptographic attestation and open infrastructure components&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Run confidential AI workloads&lt;/STRONG&gt; efficiently with Intel® AMX acceleration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As a first for Azure’s confidential VM offerings, we are adding support for&amp;nbsp;&lt;STRONG&gt;local NVMe SSDs for our DCedsv6-series and ECedsv6-series&lt;/STRONG&gt;. These sizes are suited for storage workloads that need a balance of SSD capacity, compute, and memory. With NVMe we can achieve nearly 5× more throughput while reducing latency by about 16% compared to the previous SCSI generation. Overall, we see lower IO latency by ~27 microseconds across block size and thread count.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This figure shows NVMe vs SCSI local disk performance ratio for IOPS to latency for random reads with 8K block size, queue depth of 1, and 1 thread.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This figure shows NVMe vs SCSI local disk performance for random reads with 8K block size and queue depth of 8 across various thread counts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, these TDX confidential VMs are Azure confidential compute's first offering to utilize our &lt;A href="https://github.com/microsoft/openvmm" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;open-source&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&amp;nbsp;paravisor,&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windowsosplatform/openhcl-the-new-open-source-paravisor/4273172" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;OpenHCL&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&amp;nbsp;This innovation allows us to increase transparency and verifiability for our customers, reinforcing our commitment to the trust-but-verify principle for confidential computing. These VMs also support&amp;nbsp;&lt;STRONG&gt;Azure Boost,&lt;/STRONG&gt;&amp;nbsp;enabling up to 205k IOPS and 4 GB/s throughput of remote storage along with 40 Gbps VM network bandwidth.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Customers are excited to use TDX based Confidential VMs&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;“At Bosch Trustworthy Collaboration Services, we’ve enrolled our collaboration platform on Azure’s latest Confidential VMs powered by Intel® 5th Generation Xeon® processors with TDX support. That means better transparency, stronger performance, and more robust verification: the foundation we need for cross-company teamwork. These improvements reinforce our capability to deliver best-in-class secure collaboration capabilities to our customers with our Trusted Collaboration Spaces.” - Dr. Sven Trieflinger, CTO Bosch Trustworthy Collaboration Services&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;“Ensuring data security across its entire lifecycle has always been a key priority for me. Until recently, encryption for data-in-use was the missing link, preventing true end-to-end protection managed by the customer. Through collaboration with Microsoft and Intel®, we have established a comprehensive ecosystem, called&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcpl.thalesgroup.com%2Fencryption%2Fend-to-end-data-protection&amp;amp;data=05%7C02%7Csimranparkhe%40microsoft.com%7Cdf3990dcc6cf4d21ff0908de21316c80%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638984693337094786%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=f9nCFHeHmqqGe8a%2FaiI3uyzCM8lBp1BtZxeEnv6PI6A%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;End-to-End Data Encryption&lt;/A&gt;. This ecosystem seamlessly unites data protection at rest, in transit, and now in use, thanks to the integration of Intel® TDX technology. The root of trust remains Thales&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcpl.thalesgroup.com%2Fencryption%2Fdata-security-platform&amp;amp;data=05%7C02%7Csimranparkhe%40microsoft.com%7Cdf3990dcc6cf4d21ff0908de21316c80%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638984693337115632%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=aeRSfCj8K3epZVm8XVgq%2BmBz5jHtdfxlNC0qzlS8B0M%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;CipherTrust Data Security Platform&lt;/A&gt;, enabling us to manage and safeguard our data with confidence. Of course, leveraging that technology for our own use significantly strengthens our cyber defenses. I would like to thank Microsoft for bringing this innovation to fruition.” - Didier Espinet, Chief Information Security Officer for Thales Cyber &amp;amp; Digital Identity&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;"In the public sector and other regulated industries, trust and fairness are paramount. By integrating Microsoft Azure confidential virtual machines with Intel® TDX and AMX technologies, Nuuday delivers a secure and compliant Confidential AI environment that upholds strict data sovereignty and privacy standards. These capabilities ensure sensitive information can be processed with verifiable confidentiality and integrity – while unlocking new opportunities for digital innovation." - John Henriksen, CEO, TDC Erhverv.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;“Arqit is delighted to partner with Microsoft and Intel® on the launch of Azure’s latest Intel® TDX-enabled Confidential VMs. Together we have demonstrated a combination of security-enhancing technologies to deliver provable protection of sensitive AI workloads processed across multi-region public cloud. This partnership underlines our shared commitment to giving customers full sovereign control over their data even outside of their own networks, in turn accelerating AI adoption and digital transformation.” - Jonathan Pope, VP Sales &amp;amp; Partnerships&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Offerings&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;DCesv6-series and DCedsv6-series VMs&amp;nbsp;are designed to offer a balance of memory to vCPU ratio, with up to 128 vCPUs, and up to 512 GiB of memory. The&amp;nbsp;ECesv6-series and ECedsv6-series VMs&amp;nbsp;are designed to offer an even higher memory to vCPU ratio, with up to 64 vCPUs, and 512 GiB of memory.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Availability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The DCesv6, DCedsv6, ECesv6 and ECedsv6 VMs with Intel® TDX are now generally available in West US and West US 3 regions. Customers can access these VMs through Azure Portal, Azure CLI, or Azure Powershell. We support Windows Server 2025, Ubuntu 22.04 and 24.04 guest OS versions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We will continue to receive requests for &lt;A href="https://aka.ms/acc/v6preview" target="_blank" rel="noopener"&gt;preview&lt;/A&gt; in other available regions and intend to bring them to general availability soon.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 18:56:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-general-availability-of-azure-intel-tdx-confidential/ba-p/4495693</guid>
      <dc:creator>simranparkhe</dc:creator>
      <dc:date>2026-02-26T18:56:19Z</dc:date>
    </item>
    <item>
      <title>DCasv6 and ECasv6 confidential VMs in Azure Government Cloud</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/dcasv6-and-ecasv6-confidential-vms-in-azure-government-cloud/ba-p/4494604</link>
      <description>&lt;P class="lia-align-left"&gt;Today, we are announcing the launch of the DCasv6 and ECasv6 series of confidential virtual machines (CVMs) in Azure Government.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Azure Government: Compliant, Hyperscale, Sovereign Cloud &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Azure Government was designed to remove the constraints that have historically limited federal cloud adoption by delivering hyperscale innovation without sacrificing regulatory certainty.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Supporting over 180 services, &lt;/STRONG&gt;Azure Government allows customers to consume advanced cloud capabilities without having to individually validate service availability or compliance. It is a complete end-to-end platform, delivering identity, DevOps, and services as commercial Azure, while operating entirely within accredited boundaries.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Confidential virtual machines address one of the barriers to multi-tenant cloud adoption&lt;/STRONG&gt;: When deployed on Azure Government, Confidential VMs combine physical isolation, sovereign operations, and hardware-enforced cryptographic isolation into a single execution environment. This enables customers to get additional protections from insider threats.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;At its core, Azure Government runs the same Azure codebase that powers Microsoft’s commercial cloud, providing access to compute, networking, storage, data, and AI services.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;DCasv6 and ECasv6: Confidential virtual machines in Azure government cloud&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The DCasv6 and ECasv6-series virtual machines built on 4th Generation AMD EPYC™ processors are the first in Azure Government to implement AMD SEV-SNP. This generation introduces several controls that change both security posture and operational readiness:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Hardware-Enforced Memory Isolation&lt;/STRONG&gt;: AMD SEV-SNP provides full, AES-256 encrypted memory with keys generated and managed by the onboard AMD Secure Processor.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Online key rotation&lt;/STRONG&gt;: Support for the online key rotation with the introduction of Virtual Machine Metablob disk (VMMD).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Programmatic Attestation for Audit and Zero-Trust&lt;/STRONG&gt;: Before provisioning any workload, customers can perform an attestation. This cryptographic procedure validates the integrity of the hardware and software, producing a signed report that proves the VM is a genuine confidential instance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Confidential OS Disk Encryption with Flexible Key Management&lt;/STRONG&gt;: Cryptographic protection extends beyond runtime memory to the operating system disk itself. The disk's encryption keys are bound to the VM's virtual Trusted Platform Module (vTPM), which is protected within the TEE. Customers can choose between platform-managed keys (PMK) for simplicity and regulatory ease, or customer-managed keys (CKM) for full, sovereign control over the key lifecycle - a common requirement for the most stringent compliance regimes.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;With the DCasv6 and ECasv6-series virtual machines now generally available in &lt;STRONG&gt;Azure government regions&lt;/STRONG&gt;, customers can modernize their infrastructure deployments through confidential computing which replaces implicit trust with cryptographic isolation, and when deployed on Azure Government’s sovereign cloud within physically isolated data centers, it enables agencies to modernize at operational speed without compromising control.&lt;/P&gt;
&lt;P&gt;Azure Government is in a unique position to deliver the full operational depth of a hyperscale cloud, from identity and DevOps to monitoring and edge execution, inside an environment purpose-built for federal compliance. When combined with the latest Confidential VMs, customers gain secure infrastructure built on a platform where agility, visibility, and trust reinforce each other.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;Additional resources&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-clear-both"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-government/" target="_blank" rel="noopener"&gt;Azure Government documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-clear-both"&gt;&lt;A href="https://usgovintake.embark.microsoft.com/" target="_blank" rel="noopener"&gt;Government Validation System&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 17 Feb 2026 00:27:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/dcasv6-and-ecasv6-confidential-vms-in-azure-government-cloud/ba-p/4494604</guid>
      <dc:creator>Rakeshginjupalli</dc:creator>
      <dc:date>2026-02-17T00:27:19Z</dc:date>
    </item>
    <item>
      <title>Securing Confidential VM Backups with Azure Recovery Services Vault and Private Endpoints</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/securing-confidential-vm-backups-with-azure-recovery-services/ba-p/4458965</link>
      <description>&lt;P&gt;When working with &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Confidential VMs (CVMs)&lt;/STRONG&gt;&lt;/A&gt; in Azure, ensuring secure backups is just as important as protecting workloads in use. Confidential VMs use hardware-based Trusted Execution Environments (TEEs) such as AMD SEV-SNP or Intel TDX to keep your data safe. But how do you securely back up this data without exposing it to the public internet? The answer lies in combining &lt;A href="https://learn.microsoft.com/en-us/azure/backup/backup-azure-recovery-services-vault-overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Azure Recovery Services Vault (RSV)&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;with &lt;STRONG&gt;Private Endpoints&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;In this blog, we’ll walk through why this setup matters, how to configure it, and what challenges you should watch out for.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; This blog specifically deals with &lt;STRONG&gt;CVMs encrypted with Confidential OS Encryption on the OS Disk&lt;/STRONG&gt;. As of now, Azure Backup for CVMs is in &lt;STRONG&gt;Private Preview&lt;/STRONG&gt;, so make sure to engage with your &lt;STRONG&gt;Microsoft Account Team or Product Team&lt;/STRONG&gt; for access.&lt;/P&gt;
&lt;H2&gt;Why Use Private Endpoints for RSV?&lt;/H2&gt;
&lt;P&gt;By default, the Recovery Services vault communicates over public endpoints. With private endpoints, all traffic between your Confidential VM and RSV flows over the secure Microsoft backbone instead of the public internet. This adds an extra layer of isolation and protection — a perfect match for sensitive workloads.&lt;/P&gt;
&lt;H2&gt;What You’ll Need (Prerequisites)&lt;/H2&gt;
&lt;P&gt;Before jumping in, make sure you have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;An &lt;STRONG&gt;Azure Subscription&lt;/STRONG&gt; and appropriate permissions (Owner/Contributor for RSV, DNS Zone Contributor for DNS).&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Confidential VM&lt;/STRONG&gt; on supported &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-options#sizes" target="_blank" rel="noopener"&gt;SKUs&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Recovery Services Vault&lt;/STRONG&gt; in the same or a peered region.&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Virtual Network and Subnet&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;Use a dedicated subnet for private endpoints.&lt;/LI&gt;
&lt;LI&gt;A private endpoint connection for Backup uses &lt;STRONG&gt;11 private IPs&lt;/STRONG&gt; (including Azure Backup storage). This may be higher in certain regions.&lt;/LI&gt;
&lt;LI&gt;Recommended subnet size: &lt;STRONG&gt;/25 to /27&lt;/STRONG&gt; to ensure sufficient private IP availability.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Private DNS Zones&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;privatelink.backup.windowsazure.com (for the vault itself)&lt;/LI&gt;
&lt;LI&gt;privatelink.blob.core.windows.net (staging and recovery data)&lt;/LI&gt;
&lt;LI&gt;privatelink.queue.core.windows.net (backup operations queue)&lt;/LI&gt;
&lt;LI&gt;privatelink.table.core.windows.net (metadata storage)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Backup for CVMs&lt;/STRONG&gt; supports only the &lt;STRONG&gt;3-blob&lt;/STRONG&gt; layout, which is now &lt;STRONG&gt;generally available&lt;/STRONG&gt;. As a result, all new deployments on versions v5 and v6 SKUs will have 3-blob configuration by default instead of the previous 2-blob setup. Older deployments that did not enable the Preview Feature may need to be redeployed to align with this change.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Backup Private Preview Feature&lt;/STRONG&gt; enabled on the subscription-level in collaboration with the Azure Product Team.&lt;/LI&gt;
&lt;LI&gt;Up-to-date &lt;STRONG&gt;Backup Extension&lt;/STRONG&gt; on the VM.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Step-by-Step: Configuring Backup with Private Endpoints&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Request Product Team Enablement&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;Work with Microsoft support/product team to enable the &lt;STRONG&gt;Azure Backup Private Preview Feature&lt;/STRONG&gt; for your subscription.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Create the Recovery Services Vault&lt;/STRONG&gt; in the desired region.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Add a Private Endpoint&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;Go to RSV → Networking → Private Endpoint connections.&lt;/LI&gt;
&lt;LI&gt;Select your VNet and subnet (ensure enough private IPs: /25 to /27 recommended).&lt;/LI&gt;
&lt;LI&gt;Link to the required private DNS zones.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Backup on the Confidential VM&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;Open the VM → Backup.&lt;/LI&gt;
&lt;LI&gt;Select the RSV.&lt;/LI&gt;
&lt;LI&gt;Choose or create an &lt;STRONG&gt;Enhanced policy&lt;/STRONG&gt; (required for CVMs).&lt;/LI&gt;
&lt;LI&gt;Trigger the initial backup.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Key Considerations for Confidential VM Backup&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced Policies Only&lt;/STRONG&gt;: CVM backup supports only &lt;STRONG&gt;Enhanced policies&lt;/STRONG&gt;. Backup support for CVM with confidential OS disk encryption using CMK is only available with Enhanced policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zone-Redundant Recovery Services Vault (ZRS)&lt;/STRONG&gt;: Consider deploying RSV as &lt;STRONG&gt;ZRS&lt;/STRONG&gt; if you want to restore CVMs across zones. Restores from other zones are possible only via vault; &lt;STRONG&gt;snapshot restores are not supported&lt;/STRONG&gt; across zones.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;CVM Backup with CMK Support&lt;/STRONG&gt;: Currently available only under &lt;STRONG&gt;Private Preview on an enrollment basis&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Key Vault and Managed HSM Permissions&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;When configuring via &lt;STRONG&gt;Azure Portal&lt;/STRONG&gt;, access to Key Vault/Managed HSM is granted automatically.&lt;/LI&gt;
&lt;LI&gt;When using &lt;STRONG&gt;PowerShell, CLI, or REST API&lt;/STRONG&gt;, access issues occur because Azure Backup requires explicit permissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Fix: Assign Permissions to Azure Backup&lt;/STRONG&gt;:
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;For Key Vault&lt;/EM&gt;: Grant &lt;STRONG&gt;Get, List, Backup&lt;/STRONG&gt; key permissions (no secret permissions needed).&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;For Managed HSM&lt;/EM&gt;:
&lt;UL&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Managed HSM → Local RBAC → Add Role Assignment&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Assign one of the following:
&lt;UL&gt;
&lt;LI&gt;Built-in Role: &lt;STRONG&gt;Managed HSM Crypto User&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Custom Role: Ensure dataActions include:
&lt;UL&gt;
&lt;LI&gt;Microsoft.KeyVault/managedHsm/keys/read/action&lt;/LI&gt;
&lt;LI&gt;Microsoft.KeyVault/managedHsm/keys/backup/action&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Set scope to the specific key (or All Keys).&lt;/LI&gt;
&lt;LI&gt;Assign role to &lt;STRONG&gt;Backup Management Service&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Once permissions are configured, proceed with CVM backup setup as usual.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Restore Options and Limitations&lt;/H2&gt;
&lt;P&gt;When restoring a Confidential VM, Azure Backup provides several restore paths — each with certain caveats due to the confidential computing model:&lt;/P&gt;
&lt;OL data-spread="true"&gt;
&lt;LI&gt;&lt;STRONG&gt;Restore to Original Location&lt;/STRONG&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;You can restore the CVM directly to the same subscription, resource group, and network configuration.&lt;/LI&gt;
&lt;LI&gt;Ideal for operational recovery after accidental deletion or corruption.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Restore to Alternate Location&lt;/STRONG&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;You can restore the backup to a different resource group, virtual network, or availability zone.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Limitations:&lt;/STRONG&gt; Only supported when RSV is deployed as &lt;STRONG&gt;Zone-Redundant (ZRS)&lt;/STRONG&gt;. Snapshot restore is &lt;STRONG&gt;not supported&lt;/STRONG&gt; when restoring to other zones.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disk-Level Restore&lt;/STRONG&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;Allows restoring specific managed disks (OS or data disks) from the backup vault.&lt;/LI&gt;
&lt;LI&gt;Restored disks can be used to recreate CVMs manually.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Limitations:&lt;/STRONG&gt; Replacement of OS Disk on the existing VM is &lt;STRONG&gt;not supported&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Point-in-Time Restore (Enhanced Policy Only)&lt;/STRONG&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;Available for Enhanced Backup Policies with configurable retention settings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;Restore Limitations&lt;/H4&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;STRONG&gt;Encryption Constraints&lt;/STRONG&gt;: Restores for CVMs with CMK require the same Key Vault access and permissions to be valid at restore time.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Private DNS Dependency&lt;/STRONG&gt;: Incorrect or missing DNS resolution for blob or backup endpoints can cause restore failures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Feature Availability&lt;/STRONG&gt;: All restore capabilities mentioned above are still evolving under the &lt;STRONG&gt;Azure Backup Private Preview program&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Security Benefits&lt;/H2&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Isolation&lt;/STRONG&gt;: All communication between CVMs, the Recovery Services Vault, and backup storage occurs over private IPs using private endpoints — no exposure to the public internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;End-to-End Encryption&lt;/STRONG&gt;: Backup data is encrypted both at rest and in transit. Use &lt;STRONG&gt;Customer-Managed Keys (CMK)&lt;/STRONG&gt; in Azure Key Vault or Managed HSM for greater control over encryption.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Role-Based Access Control (RBAC)&lt;/STRONG&gt;: Fine-grained access management ensures only authorized users and services can trigger or restore backups.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managed Identities for Authentication&lt;/STRONG&gt;: Reduces key management complexity and enhances security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Known Issues and Limitations&lt;/H2&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS Misconfiguration&lt;/STRONG&gt;: Missing or misconfigured private DNS zones for backup, blob, queue, or table endpoints often lead to failed backups or restores.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Limited Regional Support&lt;/STRONG&gt;: Confidential VM backups with private endpoints are currently available in selected Azure regions only.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Extension Compatibility&lt;/STRONG&gt;: Ensure that the latest Azure Backup extension version is installed on the CVM. Older versions may not support CVM encryption.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Feature Dependencies&lt;/STRONG&gt;:&amp;nbsp;&lt;STRONG&gt;Azure Backup for CVMs (Private Preview)&lt;/STRONG&gt; must be manually enabled at the subscription level by the Azure Product Team.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Performance Overhead&lt;/STRONG&gt;: Due to attestation and encryption validation, backup operations may experience slight latency.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Best Practices&lt;/H2&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;STRONG&gt;Test Restore Scenarios Regularly&lt;/STRONG&gt;: Validate both backup and restore processes to ensure end-to-end functionality.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Subnet Planning&lt;/STRONG&gt;: Reserve adequate IP addresses in your subnet (/25 or /27) to accommodate private endpoints.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ZRS Deployment&lt;/STRONG&gt;: Use &lt;STRONG&gt;Zone-Redundant Recovery Services Vault (ZRS)&lt;/STRONG&gt; for better resiliency and zone-to-zone restore capability.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Enhanced Backup Policies&lt;/STRONG&gt;: Enhanced policies ensure point-in-time recovery and support for CMK-based encryption.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS Hygiene&lt;/STRONG&gt;: Keep private DNS zones properly configured and linked to ensure uninterrupted connectivity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Permission Management&lt;/STRONG&gt;: Verify Key Vault and Managed HSM permissions before initiating backup/restore through PowerShell or REST API.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Segmentation&lt;/STRONG&gt;: Use dedicated subnets for private endpoints to avoid IP conflicts and simplify network management.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate with IaC&lt;/STRONG&gt;: Use Bicep or Terraform templates for repeatable, auditable deployments of RSVs, private endpoints, and DNS configurations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor Health and Alerts&lt;/STRONG&gt;: Enable Azure Monitor and Backup Center to track job statuses, failures, and performance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Engage Product Team Early&lt;/STRONG&gt;: Contact the Microsoft Product Team early in your project to ensure required preview feature (Azure Backup for CVMs) is enabled in time.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Final Thoughts&lt;/H2&gt;
&lt;P&gt;Backing up Confidential VMs with Azure Recovery Services vault over private endpoints gives you the best of both worlds: &lt;STRONG&gt;confidential computing protections&lt;/STRONG&gt; for your workloads and &lt;STRONG&gt;secure, compliant backups&lt;/STRONG&gt; that never leave the private network. By carefully planning DNS, subnet sizing, enabling subscription features with product team help, and configuring permissions properly, you can avoid common pitfalls and strengthen your data protection strategy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; This blog specifically deals with &lt;STRONG&gt;CVMs encrypted with Confidential OS Encryption on the OS Disk&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tip:&lt;/STRONG&gt; If you’re just getting started, reach out to the Azure Product Team to enable the required features, deploy a test CVM, link it to an RSV with private endpoints, and run a backup/restore cycle to validate your configuration end-to-end.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Nov 2025 08:26:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/securing-confidential-vm-backups-with-azure-recovery-services/ba-p/4458965</guid>
      <dc:creator>PramodPalukuru</dc:creator>
      <dc:date>2025-11-29T08:26:10Z</dc:date>
    </item>
    <item>
      <title>Azure Intel® TDX confidential VMs momentum</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-intel-tdx-confidential-vms-momentum/ba-p/4470736</link>
      <description>&lt;P&gt;Azure’s next generation of Confidential Virtual Machines powered by 5th Gen Intel® Xeon® processors (code-named Emerald Rapids) with &lt;A href="https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/trust-domain-extensions.html" target="_blank" rel="noopener"&gt;Intel® Trust Domain Extensions&lt;/A&gt;&amp;nbsp;(Intel® TDX) is out in &lt;A class="lia-external-url" href="https://aka.ms/acc/v6preview" target="_blank" rel="noopener"&gt;preview&lt;/A&gt; now. This will help to enable organizations to bring confidential workloads to the cloud without code changes to applications. These instances also enable &lt;A href="https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/what-is-intel-amx.html" target="_blank" rel="noopener"&gt;Intel® Advanced Matrix Extensions&lt;/A&gt; (Intel® AMX) to accelerate confidential AI scenarios. Supported SKUs include the general-purpose DCesv6-series, as well as the memory-optimized ECesv6-series.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Confidential VMs are designed for tenants with&amp;nbsp;&lt;A href="https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html" target="_blank" rel="noopener"&gt;high security&lt;/A&gt;&amp;nbsp;and confidentiality requirements, providing a strong, attestable, hardware-enforced boundary. They ensure that your data and applications stay private and encrypted even while in use, keeping your sensitive code and other data encrypted in memory during processing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Improvements for next milestone&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As a first for Azure’s Confidential VM offerings, we are soon adding support for &lt;STRONG&gt;local NVMe SSDs for our DCedsv6-series and ECedsv6-series&lt;/STRONG&gt;. These sizes are suited for storage workloads that need a balance of SSD capacity, compute, and memory. With NVMe we can achieve nearly 5× more throughput while reducing latency by about 16% compared to the previous SCSI generation. Overall, we see lower IO latency by ~27 microseconds across block size and thread count.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;This figure shows NVMe vs SCSI local disk performance ratio for IOPS to latency for random reads with 8K block size, queue depth of 1, and 1 thread.&lt;/img&gt;&lt;img&gt;This figure shows NVMe vs SCSI local disk performance for random reads with 8K block size and queue depth of 8 across various thread counts.&lt;/img&gt;
&lt;P&gt;Additionally, these TDX confidential VMs are Azure’s first offering to utilize our &lt;A href="https://github.com/microsoft/openvmm" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;open-source&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; paravisor,&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windowsosplatform/openhcl-the-new-open-source-paravisor/4273172" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;OpenHCL&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt; This innovation allows us to enhance transparency with our customers, reinforcing our commitment to the "trust but verify" model. These VMs also support &lt;STRONG&gt;Azure Boost,&lt;/STRONG&gt; enabling up to 205k IOPS and 4 GB/s throughput of remote storage along with 40 Gbps VM network bandwidth.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Customers are excited to use TDX based Confidential VMs&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;“At Bosch Trustworthy Collaboration Services, we’ve enrolled our collaboration platform on Azure’s latest Confidential VMs powered by Intel’s 5th Generation Xeon processors with TDX support. That means better transparency, stronger performance, and more robust verification: the foundation we need for cross-company teamwork. These improvements reinforce our capability to deliver best-in-class secure collaboration capabilities to our customers with our Trusted Collaboration Spaces.” - Dr. Sven Trieflinger, CTO Bosch Trustworthy Collaboration Services&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;“Ensuring data security across its entire lifecycle has always been a key priority for me. Until recently, encryption for data-in-use was the missing link, preventing true end-to-end protection managed by the customer. Through collaboration with Microsoft and Intel, we have established a comprehensive ecosystem, called &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcpl.thalesgroup.com%2Fencryption%2Fend-to-end-data-protection&amp;amp;data=05%7C02%7Csimranparkhe%40microsoft.com%7Cdf3990dcc6cf4d21ff0908de21316c80%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638984693337094786%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=f9nCFHeHmqqGe8a%2FaiI3uyzCM8lBp1BtZxeEnv6PI6A%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;End-to-End Data Encryption&lt;/A&gt;. This ecosystem seamlessly unites data protection at rest, in transit, and now in use, thanks to the integration of Intel TDX technology. The root of trust remains Thales &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcpl.thalesgroup.com%2Fencryption%2Fdata-security-platform&amp;amp;data=05%7C02%7Csimranparkhe%40microsoft.com%7Cdf3990dcc6cf4d21ff0908de21316c80%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638984693337115632%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=aeRSfCj8K3epZVm8XVgq%2BmBz5jHtdfxlNC0qzlS8B0M%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;CipherTrust Data Security Platform&lt;/A&gt;, enabling us to manage and safeguard our data with confidence. Of course, leveraging that technology for our own use significantly strengthens our cyber defenses. I would like to thank Microsoft for bringing this innovation to fruition.” - Didier Espinet, Chief Information Security Officer for Thales Cyber &amp;amp; Digital Identity&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;"In the public sector and other regulated industries, trust and fairness are paramount. By integrating Microsoft Azure confidential virtual machines with Intel® TDX and AMX technologies, Nuuday delivers a secure and compliant Confidential AI environment that upholds strict data sovereignty and privacy standards. These capabilities ensure sensitive information can be processed with verifiable confidentiality and integrity – while unlocking new opportunities for digital innovation." - John Henriksen, CEO, TDC Erhverv.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;“Arqit is delighted to partner with Microsoft and Intel on the launch of Azure’s latest Intel TDX-enabled Confidential VMs. Together we have demonstrated a combination of security-enhancing technologies to deliver provable protection of sensitive AI workloads processed across multi-region public cloud. This partnership underlines our shared commitment to giving customers full sovereign control over their data even outside of their own networks, in turn accelerating AI adoption and digital transformation.” - Jonathan Pope, VP Sales &amp;amp; Partnerships&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Offerings&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;DCesv6-series and DCedsv6-series VMs&amp;nbsp;are designed to offer a balance of memory to vCPU ratio, with up to 128 vCPUs, and up to 512 GiB of memory. The&amp;nbsp;ECesv6-series and ECedsv6-series VMs&amp;nbsp;are designed to offer an even higher memory to vCPU ratio, with up to 64 vCPUs, and 512 GiB of memory.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Availability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We expect the DCesv6, DCedsv6, ECesv6 and ECedsv6 VMs with Intel® TDX&amp;nbsp;to be generally available in the first quarter of 2026 in select US regions and Europe regions. In the meantime, please sign up for our DCesv6 and ECesv6 VM preview at&amp;nbsp;&lt;A href="https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR14xUOCZvvNNjxzop0-giQBUN1ZJRzhFSkdESVJOSkFQVE9RTEtRUVVFVi4u" target="_blank" rel="noopener"&gt;aka.ms/acc/v6preview&lt;/A&gt; and we will contact you with further instructions.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 16:16:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-intel-tdx-confidential-vms-momentum/ba-p/4470736</guid>
      <dc:creator>simranparkhe</dc:creator>
      <dc:date>2025-12-05T16:16:04Z</dc:date>
    </item>
    <item>
      <title>Generational Performance Leap for Azure Confidential Computing</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/generational-performance-leap-for-azure-confidential-computing/ba-p/4468989</link>
      <description>&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;At Microsoft, protecting customer data is a foundational commitment. Organizations moving their most sensitive workloads to the cloud require assurances beyond just encryption of data-at-rest and data-in-transit. They need robust protection while the data is in use, and they need it without sacrificing the performance of their business-critical applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Confidential Computing&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;emerged&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;as a technology to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;address&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;this need for data-in-use protection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;For years, a key consideration for adopting confidential computing has been the perceived trade-off between stronger security and application performance. To provide our customers with transparent, third-party validation,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;and AMD&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;commissioned a technical analysis from Prowess Consulting, an independent research firm specializing in hands-on performance validation for the enterprise IT industry.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Their report provides an assessment of our&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;latest generation&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;confidential VMs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Azure confidential VMs, powered by the latest 4th generation AMD EPYC™ processors, deliver both next-generation performance and hardware-enforced security, fundamentally shifting the conversation from a security trade-off to a performance dividend. Enterprises&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;are&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;required&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;to handle sensitive information or personal data like transactions, analytics or intellectual property (IP) while&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;operating&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;under strict compliance regimes like GDPR or HIPAA can now seamlessly transition to the cloud, running their high performance, mission-critical applications on Azure’s latest confidential VMs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;A Generational Leap in Performance&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;While uncertainty surrounding the performance overhead of enabling confidential computing features&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;and performance gaps&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;, confidential computing has broadened its appeal as processors&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;leap&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;forward in both performance and capabilities with each successive generation.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;The motivation of the study was to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;identify&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;a clear performance uplift by comparing the latest Azure DCasv6 confidential VMs, powered by 4th generation AMD EPYC™ processors, against the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;previous&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;generation. The data confirms that upgrading delivers a significant and measurable performance uplift across the stack.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;77% gain in memory bandwidth&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;, driven by architectural enhancements including the adoption of DDR5 memory, directly&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;benefiting&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;data-intensive applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;34% increase in Redis throughput&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;demonstrating&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;substantial real-world gains for in-memory databases and caching workloads where latency is critical.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;A&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;30% rise in CPU throughput&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;, confirming faster execution for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;compute&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;-bound workloads on the latest generation of Azure confidential VMs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Quantifying the Overhead of SEV-SNP&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Beyond generational gains, the Prowess report&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;sought&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;to answer the critical question:&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;What is the real performance overhead of enabling AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP)?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; This hardware-level security feature isolates VMs by encrypting memory in use, protecting it even from the host hypervisor. The study compared confidential VMs (DCasv6) against general-purpose counterparts (Dasv6) running on identical 4th Gen AMD EPYC processors. The overhead introduced by these advanced protections was found to be minimal and predictable. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;An &lt;STRONG&gt;8% overhead&lt;/STRONG&gt; for CPU-intensive and Redis workloads. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;A &lt;STRONG&gt;mere 2% overhead&lt;/STRONG&gt; for memory-intensive workloads.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;These results affirm that a robust security posture with a minimum impact on performance or latency, making it a practical choice for a broad spectrum of production workloads.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;From Technical Validation to Business Value&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;For IT leaders and developers, these findings mean you no longer need to architect around performance limitations to achieve stronger security. The implications are clear:&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Confidentiality is a mainstream capability&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;. With such minimal overhead, confidential computing is no longer a niche solution for only the most sensitive data, but&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;a viable&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;option&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;for securing a diverse array of enterprise applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Modernize with confidence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;. Organizations can now confidently migrate and modernize applications on Azure confidential VMs, gaining both hardware-enforced data protection and a significant performance boost.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Unlock new possibilities&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;. This validated performance enables the processing of sensitive data from financial analytics to healthcare insights in the cloud, scenarios that were previously constrained by security and performance concerns.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;This report&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;validates&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;our commitment to delivering a confidential cloud without compromise.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&lt;STRONG&gt;Next Steps&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;We encourage you to review the detailed report and explore how Azure confidential computing can fit into your security strategy.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-justify"&gt;&lt;A href="https://prowessconsulting.com/resources/microsoft-confidential-compute-performance/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Read the full Prowess Consulting Technical Report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;for a deep dive into the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;methodology&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;and results.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;A href="https://aka.ms/azurecc" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Visit &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;the&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;confidential computing homepage&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;to learn more about our comprehensive portfolio.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Explore the&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/general-purpose/dcasv6-series" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;DCasv6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/memory-optimized/ecasv6-series?tabs=sizebasic" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ECasv6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;-series VMs today.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 13 Nov 2025 20:47:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/generational-performance-leap-for-azure-confidential-computing/ba-p/4468989</guid>
      <dc:creator>Rakeshginjupalli</dc:creator>
      <dc:date>2025-11-13T20:47:39Z</dc:date>
    </item>
    <item>
      <title>GA: DCasv6 and ECasv6 confidential VMs based on 4th Generation AMD EPYC™ processors</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/ga-dcasv6-and-ecasv6-confidential-vms-based-on-4th-generation/ba-p/4451460</link>
      <description>&lt;img /&gt;
&lt;P&gt;Today, Azure has expanded its confidential computing offerings with the general availability of the DCasv6 and ECasv6 confidential VMs.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;STRONG&gt;Regional availability&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;STRONG&gt;Jan 30 2026:&amp;nbsp;&lt;/STRONG&gt;Canada Central, Canada East, Norway East, Norway West, Italy North, Germany North, France South, Australia East, West US, West US 3, Germany West Central&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;STRONG&gt;Sep 16 2025&lt;/STRONG&gt;: Korea Central, South Africa North, Switzerland North, UAE North, UK South, West Central US&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;These VMs are powered by 4th generation AMD EPYC™ processors and feature advanced Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) technology.&lt;/P&gt;
&lt;P&gt;These confidential VMs offer:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hardware-rooted attestation&lt;/LI&gt;
&lt;LI&gt;Memory encryption in multi-tenant environments&lt;/LI&gt;
&lt;LI&gt;Enhanced data confidentiality&lt;/LI&gt;
&lt;LI&gt;Protection against cloud operators, administrators, and insider threats&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can get started today by creating confidential VMs in the Azure portal as explained &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-portal" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Highlights:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;4th generation AMD EPYC processors with SEV-SNP&lt;/LI&gt;
&lt;LI&gt;25% performance improvement over previous generation&lt;/LI&gt;
&lt;LI&gt;Ability to rotate keys online&lt;/LI&gt;
&lt;LI&gt;AES-256 memory encryption enabled by default&lt;/LI&gt;
&lt;LI&gt;Up to 96 vCPUs and 672 GiB RAM for demanding workloads&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Streamlined Security&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P class="lia-align-justify"&gt;Organizations in certain regulated industries and sovereign customers migrating to Microsoft Azure need strict security and compliance across all layers of the stack. With Azure Confidential VMs, organizations can ensure the integrity of the boot sequence and the OS kernel while helping administrators safeguard sensitive data against advanced and persistent threats. The DCasv6 and ECasv6 family of confidential VMs support online key rotation to give organizations the ability to dynamically adapt their defenses to rapidly evolving threats.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-justify"&gt;Additionally, these new VMs include AES-256 memory encryption as a default feature. Customers have the option to use Virtualization-Based Security (VBS) in Windows, which is currently in &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-key-protection-in-windows-using-vbs/4050988" target="_blank" rel="noopener" data-lia-auto-title="preview" data-lia-auto-title-active="0"&gt;preview&lt;/A&gt; to protect private keys from exfiltration via the Guest OS or applications. With VBS enabled, keys are isolated within a secure process, allowing key operations to be carried out without exposing them outside this environment.&lt;/P&gt;
&lt;H6 class="lia-align-justify"&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;&lt;U&gt;Faster Performance&lt;/U&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/H6&gt;
&lt;P class="lia-align-justify"&gt;In addition to the newly announced security upgrades, the new DCasv6 and ECasv6 family of confidential VMs have demonstrated up to 25% improvement in various benchmarks compared to our previous generation of confidential VMs powered by AMD. Organizations that need to run complex workflows like combining multiple private data sets to perform joint analysis, medical research or Confidential AI services can use these new VMs to accelerate their sensitive workload faster than ever before.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM class="lia-align-justify"&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;SPAN data-teams="true"&gt;"While we began our journey with v5 confidential VMs, now we’re seeing noticeable performance improvements with the new v6 confidential VMs based on 4th Gen AMD EPYC “Genoa” processors. These latest confidential VMs are being rolled out across many Azure regions worldwide, including the UAE. So as v6 becomes available in more regions, we can deploy AMD based confidential computing wherever we need, with the same consistency and higher performance." &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;SPAN data-teams="true"&gt;— Mohammed Retmi, Vice President - Sovereign Public Cloud, at Core42, a G42 company.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px lia-align-justify"&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;SPAN data-teams="true"&gt;"KT is leveraging Azure confidential computing to secure sensitive and regulated data from its telco business in the cloud. With new V6 CVM offerings in Korea Central Region, KT extends its use to help Korean customers with enhanced security requirements, including regulated industries, benefit from the highest data protection as well as the fastest performance by the latest AMD SEV-SNP technology through its Secure Public Cloud built with Azure confidential computing."&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;SPAN data-teams="true"&gt;— Woojin Jung,&amp;nbsp;EVP, KT Corporation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;&lt;U&gt;Kubernetes support&lt;/U&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/H6&gt;
&lt;P class="lia-align-justify"&gt;Deploy resilient, globally available applications on confidential VMs with our managed Kubernetes experience - Azure Kubernetes Service (AKS). AKS now supports the new DCasv6 and ECasv6 family of confidential VMs, enabling organizations to easily deploy, scale and manage confidential Kubernetes clusters on Azure, streamlining developer workflows and reducing manual tasks with integrated continuous integration and continuous delivery (CI/CD) pipelines. AKS brings integrated monitoring and logging to confidential VM node pools with in-depth performance and health insights, the clusters and containerized applications.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Azure Linux 3.0 and Ubuntu 24.04 support are now in preview. AKS integration in this generation of confidential VMs also brings support for Azure Linux 3.0, that contains the most essential packages to be resource efficient and contains a secure, hardened Linux kernel specifically tuned for Azure cloud deployments. Ubuntu 24.04 clusters are also supported in addition to Azure Linux 3.0. Organizations wanting to ease the orchestration issues associated with deploying, scaling and managing hundreds of confidential VM node pools can now choose from either of these two for their node pools.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;&lt;U&gt;General purpose &amp;amp; Memory-intensive workloads&lt;/U&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;img /&gt;
&lt;P class="lia-align-justify"&gt;Featuring general purpose optimized memory-to-vCPU ratios and support for up to 96 vCPUs and 384 GiB RAM, the DCasv6-series delivers enterprise-grade performance. The DCasv6-series enables organizations to run sensitive workloads with hardware-based security guarantees, making them ideal for applications processing regulated or confidential data.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;For more memory demanding workloads that exceed even the capabilities of the DCasv6 series, the new ECasv6-series offer high memory-to-vCPU ratios with increased scalability up to 96 vCPUs and 672 GiB of RAM, nearly doubling the memory capacity of DCasv6.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;You can get started today by creating confidential VMs in the Azure portal as explained&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-portal" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Additional Resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-portal" target="_blank" rel="noopener"&gt;Quickstart: Create confidential VM with Azure portal&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-arm" target="_blank" rel="noopener"&gt;Quickstart: Create confidential VM with ARM template&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-faq" target="_blank" rel="noopener"&gt;Azure confidential virtual machines FAQ&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:26:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/ga-dcasv6-and-ecasv6-confidential-vms-based-on-4th-generation/ba-p/4451460</guid>
      <dc:creator>Rakeshginjupalli</dc:creator>
      <dc:date>2026-01-30T20:26:08Z</dc:date>
    </item>
    <item>
      <title>Announcing: Microsoft transforms Licensing with Cloud Security and Confidential Computing</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-microsoft-transforms-licensing-with-cloud-security/ba-p/4423418</link>
      <description>&lt;P&gt;Microsoft is proud to announce the successful migration of its Windows Licensing Service to Azure, leveraging cutting-edge Confidential Computing and Managed Hardware Security Modules (mHSM) technology. This marks a significant breakthrough in the cloud adoption journey for workloads operating in highly secure environments, reshaping the way Microsoft’s licensing services operate securely at scale.&lt;/P&gt;
&lt;P&gt;But what did it really take to move one of Microsoft’s most security-critical services to the cloud? Read on to uncover how the team enabled the largest cryptographic workload ever run in Azure—built on high-assurance infrastructure designed for secure, high-throughput operations.&lt;/P&gt;
&lt;P&gt;Migrating highly secure workloads is made possible with the help of Confidential computing and Managed HSM empowering organizations handling highly secure, high-throughput, and confidential workloads to operate with greater confidence, flexibility, and value.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Advancing Security and Throughput&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;The Microsoft Windows Key Management Licensing Service (MKMS) is built around the protection and management of high-value cryptographic keys, which are central to its security model. This service processes billions of licensing requests and related cryptographic operations each day, using these keys to ensure that only authorized individuals have access to their Windows operating systems, desktop applications, and games. Through its focus on secure key management, MKMS supports the authenticity of software licenses and the protection of sensitive data, making secure Windows licensing possible on a global scale.&lt;/P&gt;
&lt;P&gt;With the integration of Confidential Virtual Machines (CVM) and Managed Hardware Security Modules, the service now meets modern high-security requirements by extending this rigorous protection into the cloud environment. This evolution not only reinforces Microsoft's dedication to safeguarding sensitive cryptographic operations but also ensures that customers can trust the reliability and security of their licensing experience.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Building Trust by Moving to Azure&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;Transitioning from multiple highly secure on-prem datacenters to strategically selected Azure regions has enabled greater reliability, stronger security, and a seamless customer experience for the service. This migration not only aligns with Microsoft’s Secure Future Initiative and delivers CAPEX savings by eliminating the need for hardware refreshes but also unlocks the benefits of cloud-native solutions powered by Confidential Computing and Azure Key Vault Managed HSM.&lt;/P&gt;
&lt;P&gt;Migrating MKMS licensing service from on-premises infrastructure to Azure has delivered significant operational benefits. Azure’s elastic cloud resources allow us to scale efficiently, adapting to changing workload demands and supporting future growth while optimizing costs by paying only for the resources we use.&lt;/P&gt;
&lt;P&gt;Distributing services across multiple geographic regions in Azure has substantially improved our service availability, minimizing downtime and maintaining consistent delivery even during unexpected events. This geographic redundancy ensures our customers experience fewer disruptions.&lt;/P&gt;
&lt;P&gt;By utilizing Azure’s performance-driven infrastructure, we have reduced upfront hardware investments and ongoing maintenance costs, while still meeting the high throughput, speed, and reliability necessary for large-scale cryptographic operations—achieving results on par with or better than our previous on-premises environment.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Enabling Security with Azure Confidential Computing&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;At the heart of this transformation lies Azure Confidential Computing based on 4th generation AMD EPYC™ CPUs with SEV-SNP, which safeguards sensitive data during processing through hardware-based Trusted Execution Environments (TEEs). This technology prevents unauthorized access, including by cloud administrators and datacenter operators, ensuring robust confidentiality for cryptographic operations that are central to the authenticity of software licenses.&lt;/P&gt;
&lt;P&gt;Azure encrypts data at rest and in transit, while confidential computing further secures data in use. This added layer of protection addressed essential security requirements for migrating secure workloads to Azure, supporting the safety and integrity of customer data.&lt;/P&gt;
&lt;P&gt;The migration also incorporated Azure Managed HSM to provide enhanced security and tighter control over cryptographic keys. Complemented by Confidential Virtual Machines and securely attested OS images, the service now operates in a trusted and isolated environment, delivering a resilient and scalable cryptographic foundation —crucial for managing high value cryptographic keys required for Windows licensing.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Setting a Benchmark for High-Scale Cryptographic Services&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;Microsoft’s Key Management Licensing Service, leveraging Azure Confidential Computing and the specially engineered high-throughput Managed HSM capabilities, delivers advanced performance for securely hosting confidential, high-scale workloads in the cloud. These enhanced MHSM features were designed and built to meet the immense demand of this service, enabling it to support the highest throughput cryptographic workload ever run on Azure to date.&lt;/P&gt;
&lt;P&gt;MKMS is deployed on Azure using a purpose-built, internally attested secure image to ensure a trusted baseline. The deployment leverages Azure confidential VMs, and managed hardware security modules to protect data: all data at rest and in transit is encrypted, with encryption keys secured by FIPS-validated HSMs. In addition, CVM guarantees our service that all data in-use is encrypted and secure as an additional layer of security. Comprehensive logging and monitoring are enabled across the stack: control-plane operations, host OS events, and network traffic are all recorded and analyzed for auditing and threat detection. This defense-in-depth design layers protection from the hardware and hypervisor up through network firewalls and application-level safeguards, ensuring comprehensive resilience against both volumetric and application-targeted attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Summary&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;In summary, migration of Windows Licensing to Azure signifies Microsoft’s commitment to driving innovation and security in the cloud. By leveraging Confidential Computing and Managed HSMs, Microsoft is delivering value to billions of users worldwide while reinforcing the trust placed in its services.&lt;/P&gt;
&lt;P&gt;This achievement highlights the potential of cloud-native technologies to transform traditional mission-critical systems, offering a glimpse into the future of secure and scalable computing.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 21:58:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-microsoft-transforms-licensing-with-cloud-security/ba-p/4423418</guid>
      <dc:creator>Sumithra_Shekhar</dc:creator>
      <dc:date>2025-07-07T21:58:11Z</dc:date>
    </item>
    <item>
      <title>Confidential agentic AI on Azure helps ServiceNow respond to sales commission inquiries in seconds</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/confidential-agentic-ai-on-azure-helps-servicenow-respond-to/ba-p/4424429</link>
      <description>&lt;H4&gt;Introduction&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;AI is transforming how businesses operate and innovate, unlocking opportunities across industries to pioneer new business models, solve previously intractable challenges, and create breakthrough experiences. ServiceNow is at the forefront, deploying powerful, confidential AI agents leveraging confidential computing&lt;/SPAN&gt;. Their sales commission help desk faced mounting challenges, supporting their sales force. With thousands of commission inquiries annually requiring access to sales compensation plan information, the help desk needed a solution to accelerate response times while maintaining strict data privacy and security standards.&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/hnjm0Q9xj_8?si=skh6PgcoiJrR98iG" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;H4&gt;Applications&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;ServiceNow Digital Technology leverages cutting-edge AI to streamline business operations, increase operational efficacy, and enhance employee experiences. The sales commission help desk handles inquiries ranging from policy questions to payout explanations, requiring aggregation and analysis of sensitive data from multiple systems. The manual process of responding to these inquiries—which involves gathering, anonymizing, and analyzing sensitive employee data, sales quotas, and commission structures—created bottlenecks, with resolution times stretching to days for the most complex cases.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;Use Cases&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MailCompose"&gt;To address ongoing commission management challenges, ServiceNow’s Digital Technology team partnered with Opaque Systems and Azure confidential computing team to design, build, and implement&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://www.opaque.co/confidential-agents-for-rag" target="_blank" rel="noopener"&gt;Confidential Agents&lt;/A&gt;&lt;/U&gt; that enable secure, autonomous AI systems with cryptographic privacy guarantees and auditability. The solution provides their help desk team with instantaneous access to encrypted personal commission data across multiple systems, while AI agents automatically analyze requests and generate custom responses.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By integrating securely with various data sources, the system maintains strict privacy controls and compliance while delivering rapid, trusted insights. Every action taken by the AI agents is cryptographically verified, creating an immutable record of data access and usage. This generates detailed audit trails that meet compliance and strengthen governance protocols. Through hardware-based encryption on &lt;U&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Fvirtual-machines%2Fsizes%2Fgpu-accelerated%2Fnccadsh100v5-series%3Ftabs%3Dsizebasic&amp;amp;data=05%7C02%7Ckhande%40microsoft.com%7Caad2c27d586547985d6308ddaec15100%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638858867578912415%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=o6qokOhAJTHmITSnOijJoJtnJVYcqhUO9CEM0KLj7lc%3D&amp;amp;reserved=0" target="_blank" rel="noopener" data-linkindex="2" data-auth="NotApplicable" data-outlook-id="ed40508d-a9ff-48af-9be6-1b957403e0aa"&gt;Azure NCCads H100 v5 confidential virtual machines&lt;/A&gt;&lt;/U&gt; augmented by NVIDIA H100 Tensor Core GPUs for accelerated computing running on their Microsoft Azure subscription service, the services built by ServiceNow can now harness the full power of AI technology without compromising on capabilities. Opaque’s Confidential AI Platform unlocks new performance potential of AI models that demand high-performing computational resources for all the commission requests, while maintaining robust protection of compensation data, setting a new standard for secure, efficient commission management.&lt;/P&gt;
&lt;H4&gt;Accelerate, Reclaim, and Save&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;Opaque's Confidential AI Agents architecture was uniquely built with NVIDIA H100s to help ServiceNow’s transformation. Once AI agents are connected to sensitive data, every aspect of agent operation maintains verifiable privacy and security, including real-time attestation that verifies agent authenticity and integrity, comprehensive audit trails of all agent actions and data interactions, cryptographic enforcement of data access and usage policies, and protection of valuable agent models and intellectual property. This combination of autonomous capability and verifiable privacy and security makes it ideal for ServiceNow to leverage for sensitive sales commission data while maintaining the highest standards of privacy and trust.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The implementation of Opaque's Confidential AI Agents delivered strong results across ServiceNow's sales operations. Average response times decreased from 4 days to just 8 seconds, dramatically improving service delivery. Sellers can find quick summaries of Sales Success Center material and links to learn more. They also reported a 74% accuracy rate of agent responses, demonstrating high relevancy. Beyond operational improvements, ServiceNow improved operating costs while simultaneously strengthening their security posture through confidential computing. Most importantly, this has freed up the help desk team to focus on more strategic, high-value work while delivering faster, more accurate support to the sales force, creating a virtuous cycle of improved efficiency and satisfaction.&lt;/P&gt;
&lt;H4&gt;Learn more&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/cvm-h100-ga" target="_blank" rel="noopener"&gt;Azure confidential VMs with NVIDIA H100 Tensor Core GPUs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/gpu-options" target="_blank" rel="noopener"&gt;Azure confidential GPU Options&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.opaque.co%2Fproduct&amp;amp;data=05%7C02%7Ckhande%40microsoft.com%7Caad2c27d586547985d6308ddaec15100%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638858867578933124%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=m2b%2Fr34klsiQbh7Q5dLEP0kFXrlKe04bG6NP2u8jjsE%3D&amp;amp;reserved=0" target="_blank" rel="noopener" data-outlook-id="1d1d1b1e-5c95-424e-ac71-e621aac199dc" data-auth="NotApplicable" data-linkindex="4"&gt;Opaque’s Confidential AI Platform&lt;/A&gt; &amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nvidia.com%2Fen-us%2Fdata-center%2Fh100%2F&amp;amp;data=05%7C02%7Ckhande%40microsoft.com%7Caad2c27d586547985d6308ddaec15100%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638858867578922029%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=bxboCyYZx4PrLcbvzPQSptCoYLEJ3KM%2FWHt0MDkLzhw%3D&amp;amp;reserved=0" target="_blank" rel="noopener" data-outlook-id="4fe20788-eed8-403c-93f3-febf34a83032" data-auth="NotApplicable" data-linkindex="3" data-olk-copy-source="MessageBody"&gt;NVIDIA H100&amp;nbsp;Tensor Core&amp;nbsp;GPUs&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2025 00:18:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/confidential-agentic-ai-on-azure-helps-servicenow-respond-to/ba-p/4424429</guid>
      <dc:creator>Krishnaprasad_Hande</dc:creator>
      <dc:date>2025-06-19T00:18:28Z</dc:date>
    </item>
    <item>
      <title>Azure Confidential VMs help keep BMW Group’s identities and passwords protected while in use</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-vms-help-keep-bmw-group-s-identities-and/ba-p/4413835</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Evolving identity and access management for the cloud&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Security&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, performance, and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;reliability&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; are the guiding principles behind Microsoft's identity and access management solutions. These solutions empower organizations to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;maintain&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; their competitive edge by &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;leveraging&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; technology effectively. With Microsoft's robust cloud infrastructure, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;customer &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;business teams, plant workers, and external vendors can manage huge workloads independently and around the clock. Collaborative success is &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;facilitated&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, ensuring &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;timely&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; results and efficient release cycles, helping businesses like the BMW Group stay at the forefront of their markets.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Before it can achieve results or make a measurable impact, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;must&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; give &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;every &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;employee&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, including independent workers,&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;highly &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;safe &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;secure access to company systems and devices. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;It’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; for that reason the whole company &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;couldn’t&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;function&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; without identity management authenticatio&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;n&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;I&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;f employees &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;can’t&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;securely &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;sign in to their systems and workstations, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;all work&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; comes to a halt.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Microsoft's identity and access management solutions play a crucial role in enhancing security, efficiency, and user experience across various industries. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;For &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group specifically, conversations about identity systems are &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;occurring against a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; backdrop of &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;organization&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;-wide &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;modernization. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;The company&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; chose to move to the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;cloud&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;early on &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;so it could&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; unlock &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;more opportunities for &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;on-demand flexibility, scalability, and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; fast&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; access to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; technological innovations, e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;specially new and advanced security features.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;As &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;started to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;migrate its IT estate to&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Azure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;t &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;also &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;wanted a more secure platform for its on-premises &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Microsoft &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Active Directory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; environment and domain controllers. The group has &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;some &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;older &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;applications that require A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; identification and access services but &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;aren&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;’&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; yet compatible with next-generation&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, cloud-native&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/identity-access/microsoft-entra-id" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Entra ID&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; protection. Some&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; of these IT&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; systems&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, servers, and applications&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; are also old&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;difficult&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and expensive to replace but essential to support &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;onsite &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;business&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; or &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;are &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;standard in the automotive industry&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, such as &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;hardware and software components&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; built into &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;plant machinery used for car production. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;U&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;se of this machinery can extend beyond &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;30&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; years&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Given the dependencies, the BMW Group focuses more on &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;building a foundation to boost &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;reliability and stability for &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;its &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;production processes than integrating them with a modern authentication system.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;In response, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;wanted&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;use its on-premises Active Directory licenses to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;migrat&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;e&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;existing&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; servers and domain controllers to Azure while actively protecting data and storage resources&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; the privacy of data in server memory, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;its&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;overall operations.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Maintaining&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;critical infrastructure&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; with confidential virtual machines on Azure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Considering the criticality and sensitivity of its services, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group was interested in evaluating&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;confidential computing&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;a &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;technology that helps protect &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;highl&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;y sensitiv&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; data that is &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;n use in server &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;memory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;When &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the BMW Group&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; started to look at &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;confidential computing&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, Microsoft was the only vendor offering &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;a &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;generally availab&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;le&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;conf&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;idential&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;computing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;platform for &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the BMW Group &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;o b&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ring &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;their Active Directory &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;domain controller&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the cloud: &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Azure DCasv5 confidential &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;virtual machines (&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;VMs&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; using 3&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="10" data-ccp-parastyle="No Spacing"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; generation AMD EPYC&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;™&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;processors. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;his technology allowed them &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;do the migration&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; without &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;changing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;any &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;code&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group IT specialists decided to start with confidential VMs running A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; services as a &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;tier&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; 0 &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;workload in Azure to tighten security and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;put&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;those servers on a future-proven track for how to continue &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;operating&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; for the next &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;5–&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;10 years.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;As it started using confidential VMs, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group appreciated &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;being able&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;eliminate&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; several potential attack paths as it used domain controllers in a public cloud environment for the first time&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. Without confidential computing, the datacenter operator, host operator, and VM host operator could &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;have been able to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;access &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;company&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; system&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; and the Active Directory database. On top of the added security benefits&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; moving forward&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group IT specialists also &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;remarked that performance &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;for workloads and applications &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;didn’t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; suffer &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;running on &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the AMD&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;based &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;confidential VMs,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; which &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;greatly &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;reduc&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ed&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; worries about potential lapses in availability while making the switch.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;The group’s &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Azure DCasv5 &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;confidential VMs&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; using 3rd generation AMD EPYC&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;™&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; processors &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;have quickly become the center of its architecture and the main &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;component&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; for its domain controllers. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Staying&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; within&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; the Microsoft ecosystem for daily identity administration, its &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;privileged access workstation&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; relies on &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/endpoint-management/microsoft-intune" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Intune&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/products/azure-bastion" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Bastion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/products/key-vault" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Key Vault&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/azure/key-vault/managed-hsm/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Key Vault Managed HSM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; other&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; services.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; Additionally, many of its modern applications that &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;don’t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; require &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;earlier&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; support are onboarded directly to Entra ID.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Changing attitudes, adopting &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;a &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Z&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ero &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;rust&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; security model&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, and measuring success&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Many organizations&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; recognize&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; that security and identity and access management are two pieces of the same puzzle, each with an essential role in &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;their&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; organization&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;’s operations&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;The &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; staff have helped &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;buil&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;d a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; castle, strengthening security from the outside&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;in, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and any activity within the network is on the secure side&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. Now, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;they are&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; moving to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; a&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;Z&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ero &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;rust&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; framework&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, which &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;removes any implicit trust and requires&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; each &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;component&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, supplier, and authentication process to be &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;thoroughly assessed &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;validated&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; before being granted access&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. From this internal perspective, the main challenge is to upskill everybody in the&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ir&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; team&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;I&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;t’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; a completely &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;different way&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;deploy infrastructure, which is now &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;mainly &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;done by code instead of requesting &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;and installing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;a physical server&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;But the result for BMW Group customers is an almost invisible benefit &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;that’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; extremely meaningful. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;It was key not to have any downtime or business impacts, and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;company staff successfully and seamlessly deployed services for customers &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;with the first bunch of domain controllers running on Azure, without those customers noticing or having to worry about where services were coming from&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;The group’s main measure of success is getting rid of all its on-premises components, including all on-premises servers and many supporting systems previously needed to offer and support BMW Group services. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;In doing so, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the BMW Group&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; will have all&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; of&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; its systems needed for A&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;ctive &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;irectory&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; operation hosted &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;o&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;n Azure&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Achieving security goals and sharing cloud experiences across the business&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;The &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; new highly&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; secure architecture and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;DCasv5 &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;confidential VMs touch every part of the business across the full &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;life&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;cycle&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; of identities and are used by internal and external employees, large and strategic partners, and joint venture partners. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Boosting security and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;safeguarding &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;its&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; platform were the&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; company’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; main goal&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; and are&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; now&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;its&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; main benefit&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; The BMW Group is &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;heavily reducing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;its&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; risk&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, with the main goal of making &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;it&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;very &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;difficult&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; for an attacker &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;to get into &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;its&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; systems.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;Microsoft's geographically widespread Azure datacenters enhance businesses' ability to support local branches and plants, increasing service availability and distribution around the globe.&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;Planned IT projects at &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group include transitioning to DCasv6 VMs, the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;newest&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; confidential VMs on Azure&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;using 4th generation AMD EPYC processors&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, which will bring with them a 30% performance increase over what the company has already gained. IT specialists are also installing &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/windows/security/identity-protection/hello-for-business/hello-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows Hello for Business&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; on all client devices within the group, letting employees &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;sign&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="No Spacing"&gt;in and authenticate themselves using biometrics.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;With continued success moving its sensitive workloads to Azure, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;BMW Group&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; plans to share its experiences with other teams across the organization&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;. It also wants to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; bring the benefits of its architecture to other core systems that &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;have &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;high demand for identity and access protection&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, with everything it’s done so far showing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;what’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; possible for the future.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;iscover&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt; more about &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.bmwgroup.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;BMW Group&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;on &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.facebook.com/BMWGroup" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Facebook&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.instagram.com/bmwgroup" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Instagram&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;,&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/company/bmw-group" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://twitter.com/BMWGroup" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;X/Twitter&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;, and &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.youtube.com/c/bmwgroup" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;YouTube&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="No Spacing"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-vms-help-keep-bmw-group-s-identities-and/ba-p/4413835</guid>
      <dc:creator>Rakeshginjupalli</dc:creator>
      <dc:date>2025-05-27T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Azure Confidential computing VM and OS disk encryption through HSM backed key CMK</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-computing-vm-and-os-disk-encryption-through/ba-p/4408926</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;Why Confidential Computing with HSM-Backed Keys Is Essential:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In today’s cloud-first world, protecting sensitive data during processing is just as critical as securing it at rest or in transit. Azure Confidential Computing (ACC) Virtual Machines, when combined with Hardware Security Module (HSM)-backed Customer-Managed Keys (CMKs), provide a robust solution for organizations with strict security and compliance requirements.&lt;/P&gt;
&lt;P&gt;In this blog, we’ll explore a scenario and walk through a step-by-step solution to meet these advanced data protection needs.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Scenario:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Customer needs a highly sensitive application – May be its processing financial transactions, handling healthcare data or supporting a government workload. Customer demands not only high performance and isolation, but also complete encryption backed by Hardware Security Models (HSM)&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Components:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure Confidential Computing Virtual Machine (ACC VM)&lt;/LI&gt;
&lt;LI&gt;Key Vault Premium (HSM Backed Key)&lt;/LI&gt;
&lt;LI&gt;Key Vault Key (CMK)&lt;/LI&gt;
&lt;LI&gt;Disk Encryption Set&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;STRONG&gt;Azure Confidential Computing VM with HSM-Backed (Key vault Premium) CMK OS Disk Encryption&lt;/STRONG&gt;&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;ACC VM with HSM CMK disk encryption&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Confidential Computing (ACC) VMs are designed to protect data in use by performing computations in a hardware-based Trusted Execution Environment (TEE). This ensures that data remains secure even when it is being processed. Disk Encryption with HSM (Hardware Security Module) involves using HSM-backed keys stored in Azure Key Vault to encrypt the disks of your VMs. This provides an additional layer of security by ensuring that encryption keys are stored in a highly secure environment&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;Importance of Confidential VMs&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;Confidential VMs are crucial for organizations that handle sensitive data and require enhanced security measures. They provide the following benefits:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Protection&lt;/STRONG&gt;: Confidential VMs protect data in use, ensuring that it remains secure even during processing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance&lt;/STRONG&gt;: They help organizations meet regulatory and compliance requirements by providing robust security measures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Trust&lt;/STRONG&gt;: By using hardware-based TEEs, Confidential VMs build trust with customers and stakeholders by ensuring that data is protected at all times&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Confidential VM Disk Encryption&lt;/STRONG&gt;: Confidential VM OS Disk Encryption with Customer-Managed Keys (CMK) using Key Vault Premium tier backed Hardware Security Module (HSM) key provides enhanced security for virtual machines (VMs). This guide will walk you through the steps to configure confidential vm os disk Encryption with&amp;nbsp;Key Vault Premium (HSM Backed Key)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;The following resources must be created in sequence to deploy Azure Confidential Computing (ACC) VMs with OS disk encryption using HSM-backed Customer-Managed Keys (CMKs)&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Key Vault with Premium Pricing Tier(HSM Backed Key)&lt;/LI&gt;
&lt;LI&gt;Disk Encryption Set utilizing HSM key&lt;/LI&gt;
&lt;LI&gt;Azure Confidential VM with Disk Encryption Set&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Prerequisites to create ACC VM&lt;/H5&gt;
&lt;P&gt;1. An Azure subscription. Free trial accounts don't support confidential VM.&lt;/P&gt;
&lt;P&gt;2. To set up Confidential disk encryption with a customer-managed key, execute the command below to opt in the Confidential VM Orchestrator service principal to your tenant.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All 
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Ensure that your subscription includes the following sizes, as Confidential VMs are supports these VM sizes only&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;General Purpose without local disk: DCasv5-series, DCesv5-series&lt;/LI&gt;
&lt;LI&gt;General Purpose with local disk: DCadsv5-series, DCedsv5-series&lt;/LI&gt;
&lt;LI&gt;Memory Optimized without local disk: ECasv5-series, ECesv5-series&lt;/LI&gt;
&lt;LI&gt;Memory Optimized with local disk: ECadsv5-series, ECedsv5-series&lt;/LI&gt;
&lt;LI&gt;NVIDIA H100 Tensor Core GPU powered NCCadsH100v5-series&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;4. OS images for confidential VMs must meet specific security requirements to support a confidential OS disk encryption and ensure isolation from the underlying cloud infrastructure. Refer to the following link for the most up-to-date list of supported OS images for Azure Confidential Computing (ACC) VMs:&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview#os-support" target="_blank" rel="noopener"&gt;OS Support Images&lt;/A&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;Steps to Configure Azure Disk Encryption Set with Key Vault Supported HSM&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Create a Key Vault with Premium Pricing Tier&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Create Key Vault&lt;/STRONG&gt;: Use the following command to create a Key Vault with the Premium pricing tier, which supports HSM-backed keys.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az keyvault create --name &amp;lt;keyvaultName&amp;gt; --resource-group &amp;lt;resourceGroupName&amp;gt; --location &amp;lt;location&amp;gt; --sku premium --enable-rbac-authorization false&lt;/LI-CODE&gt;
&lt;P&gt;2. &lt;STRONG&gt;Enable Purge Protection&lt;/STRONG&gt;: Enable purge protection to add an extra layer of security.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az keyvault update --name &amp;lt;keyvaultName&amp;gt; --resource-group &amp;lt;resourceGroupName&amp;gt; --enable-purge-protection true&lt;/LI-CODE&gt;
&lt;P&gt;3. &lt;STRONG&gt;Configure Access Policy&lt;/STRONG&gt;: Set the access policy to allow necessary permissions to user Manged identity. If you don’t have any user managed identity you can create one.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az keyvault set-policy --name &amp;lt;keyvaultName&amp;gt; --object-id &amp;lt;user-managed-identity-object-id&amp;gt; --secret-permissions get list --key-permissions get list --certificate-permissions get list&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;4. Create HSM-backed Key&lt;/STRONG&gt;: Create an HSM-backed CMK key in the Key Vault.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az keyvault key create --vault-name &amp;lt;keyvaultName&amp;gt; --name &amp;lt;KeyName&amp;gt; --protection hsm&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Create a Disk Encryption Set&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1. &lt;STRONG&gt;Create Disk Encryption Set&lt;/STRONG&gt;: Use the following command to create a Disk Encryption Set that will use the HSM-backed key.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az disk-encryption-set create --resource-group &amp;lt;resourceGroupName&amp;gt; --name &amp;lt;diskEncryptionSetName&amp;gt; --key-url &amp;lt;https://&amp;lt;vaultEndpoint&amp;gt;/keys/&amp;lt;keyName&amp;gt;/&amp;lt;keyVersion&amp;gt;&amp;gt; --source-vault &amp;lt;KeyVaultName&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;2. &lt;STRONG&gt;Grant Permissions&lt;/STRONG&gt;: Grant necessary permissions to the Disk Encryption Set.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az keyvault set-policy --name &amp;lt;keyvaultName&amp;gt; --resource-group &amp;lt;KeyVault Resource Group Name&amp;gt; --object-id $(az disk-encryption-set show --resource-group &amp;lt;rg of  diskEncryptionSet&amp;gt; --name &amp;lt;diskEncryptionSetName&amp;gt; --query "identity.principalId" -o tsv) --key-permissions wrapKey unwrapKey get&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;Best Practices&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Purge Protection&lt;/STRONG&gt;: Always enable purge protection for your Key Vault to prevent accidental or malicious deletion of keys.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor and Audit&lt;/STRONG&gt;: Continuously monitor and audit access to your Key Vault and encryption keys to detect any unauthorized access.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By following these steps and best practices, you can ensure that your data is securely encrypted using Azure Disk Encryption with Key Vault's HSM-backed keys&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step3: Azure Confidential Computing VM Creation and Disk Encryption with HSM Key&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Create the ACC VM&lt;/STRONG&gt;: Use the following command to create an ACC VM and encrypt OS disk with diskEncryptionSet.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;az vm create --resource-group &amp;lt;RG of VM&amp;gt; --name &amp;lt;VM_Name&amp;gt; --image &amp;lt;Image name from supported list of os image ex. "Canonical:0001-com-ubuntu-confidential-vm-jammy:22_04-lts-cvm:latest"&amp;gt; --size &amp;lt;confidential vm supported size, ex. Standard_DC64ads_v5&amp;gt; --admin-username &amp;lt;UserName&amp;gt; --generate-ssh-keys --enable-vtpm true --public-ip-sku Standard --security-type ConfidentialVM --os-disk-security-encryption-type DiskWithVMGuestState --os-disk-encryption-set $(az disk-encryption-set show --resource-group &amp;lt;rg name diskEncryptionSet&amp;gt; --name &amp;lt;diskEncryptionSet name&amp;gt; --query id -o tsv)

&lt;/LI-CODE&gt;
&lt;P&gt;By following these steps, you can create an Azure Confidential Computing VM and encrypt its Operating System (OS disk) using the Disk Encryption Set created earlier.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Common Questions for Azure Confidential virtual Machine&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;1. Custom Image can be used for confidential virtual machine (CVM)?&lt;/P&gt;
&lt;P&gt;Ans: Yes, custom image can use for CVM. Kindly refer =&amp;gt;&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/how-to-create-custom-image-confidential-vm?form=MG0AV3" target="_blank" rel="noopener"&gt;Create a custom image for Azure confidential VMs | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. What Disk SKU and encryption can be used for OS, TEMP, and DATA Disks in CVM with CMK?&lt;/P&gt;
&lt;P&gt;Ans:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For Azure Confidential VMs, the supported disk SKUs are primarily within the "DCasv5" and "ECasv5" series. Supported VM SKUs are =&amp;gt; &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-options#sizes" target="_blank" rel="noopener"&gt;Azure Confidential VM options | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Confidential OS disk encryption =&amp;gt; &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview#confidential-os-disk-encryption" target="_blank" rel="noopener"&gt;About Azure confidential VMs | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Confidential temp disk encryption =&amp;gt; &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview#confidential-temp-disk-encryption" target="_blank" rel="noopener"&gt;About Azure confidential VMs | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;3. Is CVM Backup supported in Azure backup?&lt;/P&gt;
&lt;P&gt;Ans: Backup of ACC is not supported in Azure as of now&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2025 05:23:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-computing-vm-and-os-disk-encryption-through/ba-p/4408926</guid>
      <dc:creator>AbhishekJha96</dc:creator>
      <dc:date>2025-05-02T05:23:08Z</dc:date>
    </item>
    <item>
      <title>Announcing preview for the next generation of Azure Intel® TDX Confidential VMs</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-preview-for-the-next-generation-of-azure-intel-tdx/ba-p/4404625</link>
      <description>&lt;P&gt;Today, we are excited to announce the preview of Azure’s next generation of Confidential Virtual Machines powered by the 5&lt;SUP&gt;th&lt;/SUP&gt;&amp;nbsp;Gen Intel® Xeon® processors (code-named Emerald Rapids) with&amp;nbsp;&lt;A class="lia-external-url" href="https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/trust-domain-extensions.html" target="_blank" rel="noopener"&gt;Intel® Trust Domain Extensions&lt;/A&gt;&amp;nbsp;(Intel® TDX). &amp;nbsp;This will help to enable organizations to bring confidential workloads to the cloud without code changes to applications. The supported SKUs include the general-purpose families DCesv6-series and the memory optimized families ECesv6-series.&lt;BR /&gt;Confidential VMs are designed for tenants with&amp;nbsp;&lt;A href="https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html" target="_blank" rel="noopener"&gt;high security&lt;/A&gt;&amp;nbsp;and confidentiality requirements, providing a strong, attestable, hardware-enforced boundary. They ensure that your data and applications stay private and encrypted even while in use, keeping your sensitive code and other data encrypted in memory during processing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Improvements&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure’s next generation of confidential VMs will bring improvements and new features compared to our previous generation. These VMs are our first offering to utilize our open-source paravisor, &lt;A href="https://techcommunity.microsoft.com/blog/windowsosplatform/openhcl-the-new-open-source-paravisor/4273172" target="_blank" rel="noopener"&gt;OpenHCL&lt;/A&gt;. This innovation allows us to enhance transparency with our customers, reinforcing our commitment to the "trust but verify" model.&lt;/P&gt;
&lt;P&gt;Additionally, our new confidential VMs support Azure Boost, enabling up to 205k IOPS and 4 GB/s throughput of remote storage along with 40 GBps VM network bandwidth. We are expanding the capabilities of our Intel® TDX powered confidential VMs by incorporating features from our general purpose and other confidential VMs. These enhancements include &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-vms" target="_blank" rel="noopener"&gt;Guest Attestation support&lt;/A&gt;, and support of&amp;nbsp;&lt;A href="https://www.intel.com/content/www/us/en/security/trust-authority.html" target="_blank" rel="noopener"&gt;Intel® Tiber™ Trust Authority&lt;/A&gt;&amp;nbsp;for enterprises seeking operator independent attestation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Offerings&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;DCesv6-series VMs&amp;nbsp;are designed to offer a balance of memory to vCPU ratio, with up to 128 vCPUs, and up to 512 GiB of memory. The&amp;nbsp;ECesv6-series VMs&amp;nbsp;are designed to offer an even higher memory to vCPU ratio, with up to 64 vCPUs, and 512 GiB of memory.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Availability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The DCesv6-series and ECesv6-series preview is available now in the East US, West US, West US 3 and West Europe regions. Supported OS images include Windows Server 2025, Windows Server 2022, Ubuntu 22.04, and Ubuntu 24.04. Please sign up at&amp;nbsp;&lt;A href="https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR14xUOCZvvNNjxzop0-giQBUN1ZJRzhFSkdESVJOSkFQVE9RTEtRUVVFVi4u" target="_blank" rel="noopener"&gt;aka.ms/acc/v6preview&lt;/A&gt; and we will reach out to you.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 19:35:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/announcing-preview-for-the-next-generation-of-azure-intel-tdx/ba-p/4404625</guid>
      <dc:creator>simranparkhe</dc:creator>
      <dc:date>2025-11-12T19:35:31Z</dc:date>
    </item>
    <item>
      <title>Price reduction and upcoming features for Azure confidential ledger!</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/price-reduction-and-upcoming-features-for-azure-confidential/ba-p/4387491</link>
      <description>&lt;P&gt;Effective &lt;STRONG&gt;March 1, 2025&lt;/STRONG&gt;, you can keep your records in Azure confidential ledger (ACL) at the reduced price of ~&lt;STRONG&gt;$3&lt;/STRONG&gt;/day per instance! The reduced price is for the computation and the ledger use. The price of any additional storage used will remain unchanged.&lt;/P&gt;
&lt;P&gt;To tamper protect your records: Automatically create hash (e.g. MD5 or SHA256) of your &lt;A class="lia-external-url" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azureconfidentialledger.acl-blob-storage?tab=Overview" target="_blank" rel="noopener"&gt;blob storage data and keep those in Azure confidential ledger&lt;/A&gt;. For forensics, you can verify the integrity of the data against the signature in ACL. Imagine doing this as you are migrating data from one system to another, or when you restore archived records from cold storage. It is also valuable when there is a need to protect from insider/administrator risks and confidently report to authorities.&lt;/P&gt;
&lt;P&gt;If you keep your data in Azure SQL database, you can use their &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/sql/relational-databases/security/ledger/ledger-overview?view=sql-server-ver16#database-digests" target="_blank" rel="noopener"&gt;security ledger feature to auto generate record digests and store them in confidential ledger &lt;/A&gt;for integrity protection and safeguarding.&amp;nbsp; You can use the SQL stored procedure to verify that no tampering or administrator modifications occurred to your SQL data!&lt;/P&gt;
&lt;P&gt;In addition, we are announcing the preview of &lt;STRONG&gt;User Defined Functions &lt;/STRONG&gt;for Azure confidential ledger. Imagine doing a schema validation before writing data to the Ledger or using pattern matching to identify sensitive information in log messages and perform data massaging to mask it. To increase your awareness, request access for this&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/ACL2025Preview" target="_blank" rel="noopener"&gt;preview via the sign-up form&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Get started by reading &lt;A class="lia-external-url" href="https://aka.ms/ACL-Docs" target="_blank" rel="noopener"&gt;our documentation&lt;/A&gt; and &lt;A class="lia-external-url" href="https://portal.azure.com" target="_blank" rel="noopener"&gt;trying out confidential ledger yourself&lt;/A&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;_____________________________________________________________________________________________________&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is Azure confidential ledger and what is the change?&lt;BR /&gt;&lt;/STRONG&gt;It is a &lt;EM&gt;tamper protected&lt;/EM&gt; and &lt;EM&gt;auditable &lt;/EM&gt;data store backed by a Merkle tree blockchain structure for sensitive records that require high levels of integrity protection and/or confidentiality. While customers from AI, financial services, healthcare, and supply chain continue to use the ledger for their business transaction’s archival needs and confidential data’s unique identifiers for audit purposes, we are acting on their feedback for scaling ledgers to more of their workloads with a more competitive price!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How can I use Azure confidential ledger? &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Azure SQL database ledger customers can enable confidential ledger as its trusted digest store to uplevel integrity and security protection posture&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Azure customers who use blob storage have found value in migrating their workloads to Azure with a tamper protection check via the Azure confidential ledger Marketplace App.&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Azure customers who use data stores and databases (e.g. Kusto, Cosmos, and Log Analytics) may benefit from auditability and traceability of logs being kept in the confidential ledger with new compliance certifications in &lt;A href="https://azurefeeds.com/2025/01/14/launched-generally-available-azure-confidential-ledger-achieves-soc-2-type-ii-compliance/" target="_blank" rel="noopener"&gt;SOC 2 Type 2&lt;/A&gt; and &lt;STRONG&gt;ISO27001.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How much does Azure confidential ledger cost? &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Approximately $3/day/ledger&lt;/P&gt;
&lt;P&gt;_____________________________________________________________________________________________________&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Resources&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Explore the&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/" target="_blank" rel="noopener"&gt;Azure confidential ledger documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Read the blog post on: &lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/integrity-protect-your-azure-blob-storage-data-with-azure-confidential-ledger/4050754" target="_blank"&gt;Integrity protect blob storage&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Read the blog post on:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/azuresqlblog/how-to-choose-between-ledger-in-azure-sql-database-and-azure-confidential-ledger/4186506" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="How to choose between ledger in Azure SQL Database and Azure Confidential Ledger | Microsoft Community Hub"&gt;How to choose between ledger in Azure SQL Database and Azure Confidential Ledger&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Read the blog post on:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/azure-confidential-computing/verify-the-integrity-of-azure-confidential-ledger-transactions/ba-p/4190158" target="_blank"&gt;Verify integrity of data transactions in Azure confidential ledger&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;View our&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=lJSn46id-64" target="_blank" rel="noopener"&gt;recent webinar&lt;/A&gt;&amp;nbsp;in the Security Community&lt;/LI&gt;
&lt;LI&gt;Recent case studies:&amp;nbsp;&lt;A href="https://customers.microsoft.com/en-us/story/1712139023630874715-hb-antwerp-azure-confidential-ledger-belgium" target="_blank" rel="noopener"&gt;HB Antwerp&lt;/A&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;A href="https://customers.microsoft.com/en-us/story/1702080940385125786-beekeeperai-microsoft-azure-confidential-ledger-united-states" target="_blank" rel="noopener"&gt;BeekeeperAI&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 21:41:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/price-reduction-and-upcoming-features-for-azure-confidential/ba-p/4387491</guid>
      <dc:creator>ShubhraS</dc:creator>
      <dc:date>2025-03-03T21:41:46Z</dc:date>
    </item>
    <item>
      <title>Azure Confidential Computing at Ignite 2024</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-computing-at-ignite-2024/ba-p/4298720</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is another great year for Azure Confidential Computing (ACC) team at Ignite.&amp;nbsp;We are announcing the availability of two new offerings:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;The preview of our latest DCa/ECa v6 series confidential VMs running on 4&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;th&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; generation AMD EPYC™ processors, with enhanced performance and security features.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;The preview of Azure Confidential Clean Rooms, a totally new PaaS for building privacy preserving multiparty analytics and collaboration solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;And we are amplifying the confidential AI use cases of our recently announced generally available confidential VMs with NVIDIA H100 Tensor Core GPUs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Preview of our latest DCa/ECa v6 series confidential VMs&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are thrilled to partner with AMD to offer these confidential VMs based on 4&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;th&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; generation AMD EPYC processors. They offer up to 25% better CPU performance on Windows Server 2022 compared to their previous generation counterparts. Also, for Windows Server, they offer enhanced security with the &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;option to use Virtualization-based Security (VBS) to protect secrets in a highly secure section of VM memory. And these VMs will be our most widely available confidential VM to date. To learn more and sign up for the preview read the preview blog post: &lt;/SPAN&gt;&lt;A href="https://aka.ms/Genoa-CVM-Prev-blog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://aka.ms/Genoa-CVM-Prev-blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Preview of Azure Confidential Clean Rooms&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are very excited to announce the preview Azure’s first confidential clean room offering, Azure Confidential Clean Rooms, a PaaS for building multi-party, privacy preserving applications, leveraging the Confidential Consortium Framework (CCF) and confidential containers on Azure Container Instances (ACI). &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;To learn more and sign up for the preview read the preview blog post: &lt;/SPAN&gt;&lt;A href="https://aka.ms/ACCR-preview-blog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://aka.ms/ACCR-preview-blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Confidential GPUs new use cases&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;On Thursday, November 21, at 12:30 PM CST, I will be at Ignite presenting a &lt;/SPAN&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/THR521?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;live demonstration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; of deploying an NCC H100 v5 confidential VM with NVIDIA H100 Tensor Core GPU (aka, confidential GPU) and show several use cases within the context of confidential AI including:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;How to do attestation of the confidential VM and its associated GPU&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Using confidential GPUs to support confidential retrieval-augmented generation (RAG)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Using confidential GPUs to support confidential speech to text translation with the preview of the confidential inference feature of the Azure OpenAI Whisper model&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279,&amp;quot;335559991&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Please make sure to attend if you are at the event as this event is not being broadcast and will not being recorded.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Figure 1. Architecture of Azure AI confidential inferencing&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Other recent ACC related announcements&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are excited to acknowledge the recent announcement of confidential containers on Azure Red Hat OpenShift (ARO). This gives ARO users the opportunity to provide an additional layer of protection of their sensitive workloads in memory from Azure operators and from your own application and tenant administrators. Read the blog post to learn more: &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/appsonazureblog/confidential-containers-public-preview-on-azure-red-hat-openshift/4286814?previewMessage=true" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Confidential Containers Public Preview on Azure Red Hat OpenShift | Microsoft Community Hub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are happy to report that&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/batch/batch-technical-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Batch&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; is now supported on all AMD SEV-SNP based v5 and v6 confidential VMs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;And finally, as part of Microsoft’s commitment to our &lt;U&gt;&lt;A href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative" target="_blank"&gt;Secure Future Initiative&lt;/A&gt;&lt;/U&gt;&amp;nbsp;(SFI), we are announcing our newest in-house security chip,&amp;nbsp;&lt;STRONG&gt;Azure Integrated HSM&lt;/STRONG&gt;, a dedicated Hardware Security Module (HSM) that strengthens key protection by enabling the use of encryption and signing keys while they remain within the bounds of a HSM, without incurring the typical network access latencies for HSM access. Read the blog post to learn more: &lt;A href="https://techcommunity.microsoft.com/blog/AzureInfrastructureBlog/securing-azure-infrastructure-with-silicon-innovation/4293834" target="_blank"&gt;Securing Azure infrastructure with silicon innovation | Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;ACC at Ignite sessions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In addition to my &lt;/SPAN&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/THR521?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;confidential GPU demonstration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; mentioned above, ACC powered solutions are being covered in multiple sessions at Ignite including:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODFP929?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Confidential AI with Ubuntu on Azure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK222?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Exploring the latest innovations in Azure Compute&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/StudioFP105?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Provide a new level of protection with Confidential Virtual Machines&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRKFP366?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Explore everything infrastructure with AMD EPYC on Azure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/StudioFP124?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Master managed cloud solutions to drive TTM and reduce costs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/THRFP740?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Securing critical &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;open source&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; workloads on Azure with Ubuntu&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; (in person only)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK246" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Inside Azure innovations with Mark Russinovich&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK223?source=sessions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Cloud platform security in an evolving threat landscape&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRKFP387?source=sessions" target="_blank" rel="noopener"&gt;Accelerate generative AI adoption with NVIDIA AI on Azure&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Azure continues to be a pioneer in confidential computing. There is more to come, and we look forward to you joining us on this journey.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Get started with Azure Confidential Computing&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Documentation: &lt;A class="lia-external-url" href="https://aka.ms/accdocs" target="_blank" rel="noopener"&gt;https://aka.ms/accdocs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Blogs:&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/accblogs" target="_blank" rel="noopener"&gt;https://aka.ms/accblogs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Customer and partner successes:&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/accstories" target="_blank" rel="noopener"&gt;https://aka.ms/accstories&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 19 Nov 2024 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-confidential-computing-at-ignite-2024/ba-p/4298720</guid>
      <dc:creator>VikasBhatia</dc:creator>
      <dc:date>2024-11-19T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Preview: New DCasv6 and ECasv6 confidential VMs based on 4th Generation AMD EPYC™ processors</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/preview-new-dcasv6-and-ecasv6-confidential-vms-based-on-4th/ba-p/4303752</link>
      <description>&lt;img /&gt;
&lt;P&gt;You can get started deploying your software on these confidential VMs by signing up &lt;A class="lia-external-url" href="https://aka.ms/genoa-cvm-sign-up" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional security enhancements &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;With the launch of the DCasv6 and ECasv6 confidential VM family – we support AES-256 memory encryption enabled by default. Additionally, we now offer our customers the capability to leverage &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-key-protection-in-windows-using-vbs/4050988" target="_blank" rel="noopener"&gt;key protection with Virtualization-based Security (VBS)&lt;/A&gt; in Windows. By &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-key-protection-in-windows-using-vbs/4050988" target="_blank" rel="noopener"&gt;enabling key protection&lt;/A&gt; in Windows CVMs, customers can protect keys in-use from Guest OS and applications. This key protection is enforced by CPU hardware.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Faster performance for confidential workloads&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;These new CVMs have demonstrated up to&amp;nbsp;&lt;STRONG&gt;25% improvement&lt;/STRONG&gt; in various benchmarks compared to our previous generation of AMD-based confidential VMs.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P class="lia-align-left"&gt;KT is leveraging Azure confidential computing to secure sensitive and regulated data from its telco business in the cloud. With new V6 CVM offerings in Korea Central Region, KT extends its use to help Korean customers with enhanced security requirements, including regulated industries, benefit from the highest data protection as well as the fastest performance by the latest AMD SEV-SNP technology through its Secure Public Cloud built with Azure confidential computing.&amp;nbsp;&lt;STRONG&gt;- Woojin Jung, &lt;/STRONG&gt;&lt;STRONG&gt;EVP, KT Corporation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;img /&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG style="font-style: var(--lia-blog-font-style); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); text-align: left;"&gt;Worldwide Region Availability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;These CVMs will be gradually made available across all supported Azure regions and availability zones. Please use the &lt;A href="https://aka.ms/Genoa-CVM-sign-up" target="_blank" rel="noopener"&gt;sign-up form&lt;/A&gt; to indicate interest in participating in the gated preview and regional requirements.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;General purpose &amp;amp; Memory-intensive workloads&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Featuring general purpose optimized memory-to-vCPU ratios and support up to 96 vCPUs and 384 GiB RAM, the DCasv6-series delivers enterprise-grade performance. The DCasv6-series enables organizations to run sensitive workloads with hardware-based security guarantees, making them ideal for applications processing regulated or confidential data.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;For more memory demanding workloads, the new ECasv6-series offer high memory-to-vCPU ratios with increased scalability up to 96 vCPUs and 672 GiB of RAM. The ECasv6-series is ideal for memory-intensive enterprise applications offering nearly double the memory capacity of DCasv6. The ECasv6-series scales 672 GiB RAM with up to 96 vCPUs, making them ideal for memory intensive applications that exceed even the capabilities of the DCasv6 series.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;TABLE border="1px solid rgb(52, 73, 94)" width="99.4118%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="lia-align-center" width="25.2151%" height="30.8px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;DCasv6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;DCadsv6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="20.617%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;ECasv6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="21.507%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;ECadsv6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="lia-align-center" width="25.2151%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;vCPU&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;2 - 96&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;2 - 96&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="20.617%" height="30.8px"&gt;
&lt;P&gt;2 - 96&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="21.507%" height="30.8px"&gt;
&lt;P&gt;2 - 96&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="lia-align-center" width="25.2151%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;Memory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;8 - 384&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;8 - 384&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="20.617%" height="30.8px"&gt;
&lt;P&gt;16 - 672&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="21.507%" height="30.8px"&gt;
&lt;P&gt;16 - 672&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="lia-align-center" width="25.2151%" height="30.8px"&gt;
&lt;P&gt;&lt;STRONG&gt;Max local disk&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;NA&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="16.3156%" height="30.8px"&gt;
&lt;P&gt;75-600GiB&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="20.617%" height="30.8px"&gt;
&lt;P&gt;NA&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="lia-align-center" width="21.507%" height="30.8px"&gt;
&lt;P&gt;75-600GiB&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;OS Support&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;These CVMs support the following guest operating systems: Windows Server 2019, 2022, 2025, Windows 11, Ubuntu 22.04, Ubuntu 24.04, and RHEL 9.4.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Endorsements &lt;/STRONG&gt;&lt;STRONG&gt;from our customers&lt;/STRONG&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); background-color: var(--lia-bs-gray-200); font-family: var(--lia-blog-font-family); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);"&gt;The BMW Group relies on Azure confidential VMs powered by AMD EPYC processors to enable a Zero Trust environment with end-to-end encryption for our identity authentication system, allowing over 200,000 associates to collaborate on building the future of individual mobility. The solution was made possible in part due to the fact that AMD EPYC processor based confidential VMs do not require code changes to protect data in memory. Further, our testing of the newest generation of DCasv6 VMs has shown significant improvements in performance, and we look forward to seeing them go live on Azure. - &lt;/SPAN&gt;&lt;STRONG class="lia-align-justify" style="font-style: var(--lia-blog-font-style); background-color: var(--lia-bs-gray-200); font-family: var(--lia-blog-font-family); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);"&gt;BMW Group&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Having early access to Microsoft’s latest confidential VMs is a game-changer, offering enhanced security and performance. Our customers are pleased that they won’t have to adapt existing algorithms to take advantage of computing within the optimal CVM environment available in their computing region and selected within the EscrowAI platform. - &lt;STRONG class="lia-align-justify"&gt;Mary Beth Chalk, Co-founder &amp;amp; Chief Commercial Officer, BeeKeeperAI&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN class="lia-align-justify"&gt;Anjuna is thrilled to be among the first to access Microsoft’s latest confidential VMs, powered by the newest version of the AMD SEV-SNP technology. Our ongoing partnership with Microsoft Azure provides us with early access to explore advanced security and performance features. This collaboration empowers joint Azure and Anjuna customers to leverage the newest Azure technologies from day one, enhanced by the capabilities of the Anjuna Seaglass platform. - &lt;/SPAN&gt;&lt;STRONG class="lia-align-justify"&gt;Ofir Azoulay-Rozanes, Director of Product Management, Anjuna Security&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Sign up now for exclusive access&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Joining our exclusive preview program gives you an opportunity to work with the product team.&lt;STRONG&gt; &lt;/STRONG&gt;To get started deploying your software on the latest confidential VMs sign up &lt;A class="lia-external-url" href="https://aka.ms/genoa-cvm-sign-up" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;img /&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:43:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/preview-new-dcasv6-and-ecasv6-confidential-vms-based-on-4th/ba-p/4303752</guid>
      <dc:creator>Rakeshginjupalli</dc:creator>
      <dc:date>2024-11-20T17:43:13Z</dc:date>
    </item>
    <item>
      <title>Preview of Azure Confidential Clean Rooms for secure multiparty data collaboration</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/preview-of-azure-confidential-clean-rooms-for-secure-multiparty/ba-p/4286926</link>
      <description>&lt;P&gt;Today, we are excited to announce the preview of&amp;nbsp;Azure Confidential Clean Rooms, a cutting-edge solution designed for organizations that require secure multi-party data collaboration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Confidential Clean Rooms, you can share privacy sensitive data such as personally identifiable information (PII), protected health information (PHI) and cryptographic secrets confidently, thanks to robust trust guarantees that help ensure that your data remains protected throughout its lifecycle from other collaborators and from Azure operators. This secure data sharing is powered by confidential computing, which helps protect data in-use by performing computations in hardware-based, attested Trusted Execution Environments (TEEs). These TEEs help prevent unauthorized access or modification of application code and data during use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Organizations across industries need to perform multi-party data collaboration&lt;STRONG&gt; &lt;/STRONG&gt;with business partners, outside organizations, and even within company silos to improve business outcomes and bolster innovation. Confidential Clean Rooms help derive true value from such collaborations by enabling granular and private data to be shared while providing safeguards on data exfiltration hence protecting the intellectual property of the organization and the privacy of its customers and addressing concerns around regulatory compliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whether you’re a data scientist looking to securely fine-tune your ML model with sensitive data from other organizations, or a data analyst wanting to perform secure analytics on joint data with your partner organizations, Confidential Clean Rooms will help you achieve the desired results.&lt;/P&gt;
&lt;P&gt;You can sign up for the preview &lt;A class="lia-external-url" href="https://aka.ms/ACCR-Preview-Onboarding" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Key Features&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure Collaboration and Governance: &lt;/STRONG&gt;Allows collaborators to create tamper-resistant contracts that contain the constraints which will be enforced by the clean room. Governance verifies validity of those constraints before allowing data to be released into clean rooms and helps generate tamper-resistant audit trails. This is made possible with the help of an implementation of the&amp;nbsp;&lt;A class="lia-external-url" href="https://microsoft.github.io/CCF/main/overview/what_is_ccf.html" target="_blank" rel="noopener"&gt;Confidential Consortium Framework CCF).&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced Data Privacy: &lt;/STRONG&gt;Provides a sandboxed execution environment which allows only authorized workloads to execute and prevents any unauthorized network or IO operations from within the clean room. This helps keep your data secure throughout the workload execution. This is possible with the help of deploying clean rooms in &lt;A href="https://techcommunity.microsoft.com/t5/apps-on-azure-blog/confidential-containers-on-azure-container-instances-general/ba-p/3827460" target="_blank" rel="noopener" data-lia-auto-title="confidential containers on Azure Container Instances (ACI)" data-lia-auto-title-active="0"&gt;confidential containers on Azure Container Instances (ACI)&lt;/A&gt;&amp;nbsp;which provides container group level integrity with runtime enforcement of the same.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Verifiable trust&lt;/STRONG&gt; &lt;STRONG&gt;at each step&lt;/STRONG&gt; with the help of cryptographic remote attestation forms the cornerstone of Confidential Clean Rooms.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;H2&gt;Salient Use Cases&lt;/H2&gt;
&lt;P&gt;Azure Confidential Clean Rooms caters to use cases spanning multiple industries.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Healthcare:&lt;/STRONG&gt; For fine-tuning and inferencing with predictive healthcare machine-learning (ML) models and for joint data analysis for advancing pharmaceutical research. This can help protect the privacy of patients and intellectual property of organizations while demonstrating regulatory compliance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Finance: &lt;/STRONG&gt;For financial fraud detection through analysis of combined data across banks and other financial institutions and for providing personalized offers to customers through secure analysis of transaction data and purchase data in retail outlets&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); font-style: var(--lia-font-style-base);"&gt;Media and Advertising:&lt;/STRONG&gt;&lt;SPAN style="font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); font-style: var(--lia-font-style-base); font-weight: var(--lia-bs-font-weight-base);"&gt; For improving marketing campaign effectiveness by combining data across advertisers, ad-techs, publishers and measurement firms for audience targeting and attribution and measurement&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); font-style: var(--lia-font-style-base);"&gt;Retail:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); font-style: var(--lia-font-style-base);"&gt;&amp;nbsp;For enhanced personalized marketing and improved inventory and supply chain management&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Government and Public Sector Organizations:&lt;/STRONG&gt; For analysis of high security data across multiple government and public sector organizations to streamline benefits for citizens&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Customer Testimonials&lt;/H1&gt;
&lt;P&gt;We are already partnering with several organizations to accelerate their secure multi-party collaboration journey with confidential clean rooms.&lt;/P&gt;
&lt;DIV class="lia-table-wrapper styles_table-responsive__MW0lN"&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;TABLE border="1" width="100%"&gt;&lt;COLGROUP&gt;&lt;COL width="19.1376%" /&gt;&lt;COL width="80.8624%" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="349px"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD height="349px"&gt;
&lt;P&gt;&lt;EM&gt;Confidential computing in healthcare allows secure data processing within isolated environments, called 'clean rooms', protecting sensitive patient data during AI model development, validation and deployment. Apollo Hospitals uses Azure Confidential Clean Rooms to enhance data privacy, encrypt data, and securely train AI models. The benefits include secure collaboration, anonymized patient privacy, intellectual property protection, and enhanced cybersecurity. Apollo’s pilot with Confidential Clean Rooms showed promising results, and future efforts aim to scale secure AI solutions, ensuring patient safety, privacy, and compliance as the healthcare industry advances technologically.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;- Dr. Sujoy Kar, Chief Medical Information Officer and Vice President, Apollo Hospitals&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="799px"&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD height="799px"&gt;
&lt;P&gt;&lt;EM&gt;Azure Confidential Clean Rooms is a game changer to make collaborations on sensitive data both seamless and secure. When combined with Sarus, any data processing job is automatically analyzed using the most advanced privacy technology. Once validated, they are processed securely in Confidential Clean Rooms protecting both the privacy of data and the confidentiality of the analysis itself. This eliminates administrative overheads and makes it very easy to build advanced data processing pipelines. With our partner EY, we're already leveraging it to help international banks improve AML practices without compromising privacy.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;-&amp;nbsp;&lt;/EM&gt;Maxime Agostini, CEO &amp;amp; Cofounder of Sarus&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Read &lt;A class="lia-external-url" href="https://aka.ms/ACCR-Preview-Sarus-Blog" target="_blank" rel="noopener"&gt;here&lt;/A&gt; to learn more about how Sarus is using Confidential Clean Rooms.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;As co-leaders on this Data Consortium Pilot, we are thrilled to be working with industry partners, Sarus and Microsoft, to drive this initiative forward.&amp;nbsp; By combining &lt;/EM&gt;&lt;EM&gt;Sarus’ privacy preserving technologies and Microsoft’s Azure Confidential Clean Rooms, n&lt;/EM&gt;&lt;EM&gt;ot only does this project push the edge of technology innovation, but it strives to address a pivotal issue that affects us as Canadians.&amp;nbsp; Through this work, we aim to help financial services organizations and regulators navigate the complexities of private and personal data sharing, without compromising the integrity of the data, and adhering to all relevant privacy regulations.&amp;nbsp; For the purposes of this pilot, we are focusing our efforts on how this technology can play a pivotal role in helping better detect cases of human trafficking, however, we recognize that it can be used to help organizations for multiple other use cases, and cross industries, including health care and government &amp;amp; public sector. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;- &lt;/STRONG&gt;&lt;STRONG&gt;Jessica Hansen, Privacy Partner EY Canada, and Dana Ohab, AI &amp;amp; Data Partner EY Canada&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="446px"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD height="446px"&gt;
&lt;P&gt;&lt;EM&gt;Retrieval-Augmented Generation (RAG) applications accessing Large Language Models (LLMs) are common in private AI workflows, but managing secure access to sensitive data can be complex. SafeLiShare’s integration of its LLM Secure Data Proxy (SDP) with Azure Confidential Clean Rooms (ACCR) simplifies access control and token management. The joint solution helps ensure runtime security through advanced Public Key Infrastructure (PKI) and centralized policy management in Trusted Execution Environments (TEEs), enforcing strict access policies and admission controls to guarantee authorized access to sensitive data. This integration establishes trust bindings between the Identity Provider (IDP), applications, and data, safeguarding each layer without compromise. It also enables secure creation, sharing, and management of applications and data assets, ensuring compliance in high-performance AI environments.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;- Cynthia Hsieh, VP of Marketing, SafeLiShare&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Read &lt;A class="lia-external-url" href="https://aka.ms/ACCR-Preview-SafeLiShare-blog" target="_blank" rel="noopener"&gt;here&lt;/A&gt; to learn more about how SafeLiShare is using Confidential Clean Rooms.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Learn More&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://aka.ms/ACCR-Preview-Onboarding" target="_blank" rel="noopener"&gt;Signup for the preview of Azure Confidential Clean Rooms&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://microsoft.github.io/CCF/main/" target="_blank" rel="noopener"&gt;Confidential Consortium Framework (CCF)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/apps-on-azure-blog/confidential-containers-on-azure-container-instances-general/ba-p/3827460" target="_blank" rel="noopener" data-lia-auto-title="confidential containers on Azure Container Instances (ACI)" data-lia-auto-title-active="0"&gt;Confidential containers on Azure Container Instances (ACI)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 07:01:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/preview-of-azure-confidential-clean-rooms-for-secure-multiparty/ba-p/4286926</guid>
      <dc:creator>Deepak_JV</dc:creator>
      <dc:date>2024-12-26T07:01:27Z</dc:date>
    </item>
    <item>
      <title>Adams Bridge: An Accelerator for Post-Quantum Resilient Cryptography</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/adams-bridge-an-accelerator-for-post-quantum-resilient/ba-p/4269585</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The name Adams Bridge is inspired by the mythological structure which was said to span a vast gulf between two landmasses. In the realm of cryptography, a similar vast gap exists between classical asymmetric cryptography and quantum-resilient cryptography. &amp;nbsp;Azure aims to bridge this gap by developing a fully open-source silicon quantum resilient cryptographic accelerator known as the &lt;STRONG&gt;Adams Bridge Accelerator&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;. &amp;nbsp;The Adams Bridge accelerator will be first integrated into &lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/blog/delivering-consistency-and-transparency-for-cloud-hardware-security/" target="_blank" rel="noopener"&gt;Caliptra 2.0&lt;/A&gt;&lt;SPAN&gt;, and then delivered as an independent accelerator thereafter.&amp;nbsp; This integration makes Caliptra the first open-source root-of-trust with hardened post quantum resilient cryptography. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The algorithms used in classical asymmetric cryptography depend on complex number theory problems, such as integer factorization or the discrete logarithm problem, for their security. However, research has demonstrated that a quantum computer with enough power can defeat current asymmetric algorithms. Given this, the National Institute of Standards and Technology (NIST) has been working closely with the industry for several years to create new algorithms that are safe from quantum threats. NIST has finalized its selection of quantum-safe algorithms and has released publications, &lt;/SPAN&gt;&lt;A href="https://csrc.nist.gov/pubs/fips/203/final" target="_blank" rel="noopener"&gt;FIPS 203&lt;/A&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;A href="https://csrc.nist.gov/pubs/fips/204/final" target="_blank" rel="noopener"&gt;FIP S204&lt;/A&gt;&lt;SPAN&gt; in August 2024.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The newly selected post-quantum algorithms are significantly different from their classical counterparts, which calls for a new approach to the design of digital signature schemes and attestation protocols.&amp;nbsp; Hardware device manufacturers and suppliers need to pay immediate attention to these changes as they impact foundational hardware security capabilities such as immutable root-of-trust anchors for both code integrity and hardware identity.&amp;nbsp; Currently, the risks to hardware are more significant than for software, due to longer development times and the immutability of hardware.&amp;nbsp;&amp;nbsp; Therefore, immediate action is needed for new hardware designs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To accelerate the adoption of these quantum resilient algorithms and to increase trustworthiness of hardware security, Microsoft is open sourcing our new Adams Bridge Accelerator that provides hardware acceleration for the NIST-selected quantum resilient algorithms Dilithium &amp;amp; Kyber.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Register Transfer Language (RTL) code for the Adams Bridge Accelerator – ‘Dilithium component’ is open-sourced as a discrete crypto accelerator and is also integrated into the already open-sourced Caliptra Root of Trust (RoT).&amp;nbsp; Providing the RTL for all portions of Adams Bridge will allow for easy uptake by industry partners, and save development time that would otherwise be spent developing identical functionality.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This new open-source Caliptra update will be made available in October 2024.&amp;nbsp; The Adams Bridge Accelerator – Kyber component will be released shortly thereafter.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;EM&gt;Figure 1&amp;nbsp; Caliptra Subsystem block diagram&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Caliptra 2.0 – Root of Trust Subsystem&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Caliptra, an open-source silicon root of trust for which Microsoft is a founding member, is already being adopted by leaders in modern AI infrastructure, storage and network infrastructure.&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;At the OCP Global Summit 2024, &lt;/SPAN&gt;&lt;SPAN&gt;This version of Caliptra is not only quantum resilient, but it expands upon the capabilities of Caliptra 1.0 to include the Root of Trust for Update and Root of Trust for Recovery.&amp;nbsp; Caliptra subsystem meets all the root of trust requirements of NIST 800-193 and offers a fully transparent root of trust subsystem, negating the need for additional boot controllers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For more information about Caliptra and Adams Bridge, please visit the Caliptra website: &lt;/SPAN&gt;&lt;A href="https://Caliptra.io" target="_blank" rel="noopener"&gt;https://Caliptra.io&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 19:58:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/adams-bridge-an-accelerator-for-post-quantum-resilient/ba-p/4269585</guid>
      <dc:creator>MarkRussinovich</dc:creator>
      <dc:date>2024-10-15T19:58:50Z</dc:date>
    </item>
    <item>
      <title>General Availability: Azure confidential VMs with NVIDIA H100 Tensor Core GPUs</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/general-availability-azure-confidential-vms-with-nvidia-h100/ba-p/4242644</link>
      <description>&lt;P&gt;Today, we are announcing the general availability of Azure confidential virtual machines (VMs) with NVIDIA H100 Tensor core GPUs. These VMs combine the hardware-based data-in-use protection capabilities of 4&lt;SUP&gt;th&lt;/SUP&gt; generation AMD EPYC&lt;SUP&gt;TM&lt;/SUP&gt; processor based confidential VMs with the performance of NVIDIA H100 Tensor Core GPUs. By enabling confidential computing on GPUs, Azure offers customers more options and flexibility to run their workload securely and efficiently on the cloud. These VMs are ideal for inferencing, fine-tuning or training small-to-medium sized models such as Whisper, Stable diffusion and its variants (SDXL, SSD), and language models such as Zephyr, Falcon, GPT2, MPT, Llama2, Wizard and Xwin.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure NCC H100 v5 virtual machines are currently available in East US2 and West Europe regions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="TextRun SCXW158289524 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW158289524 BCX8"&gt;Figure 1. Simplified NCC H100 v5 architecture&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="EOP SCXW158289524 BCX8" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:252}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" color="#2356EF"&gt;&lt;STRONG&gt;Hardware partner endorsements&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;We are grateful to our hardware partners for their support and endorsements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;“The expanding landscape of innovations, particularly generative AI, are creating boundless opportunities for enterprises and developers. NVIDIA’s accelerated computing platform equips pioneers like Azure to boost performance for AI workloads while maintaining robust security through confidential computing.” &amp;nbsp;&lt;STRONG&gt;Daniel Rohrer, VP of software product security, architecture and research, NVIDIA.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"AMD is a pioneer in confidential computing, with a long-standing collaboration with Azure to enable numerous confidential computing services powered by our leading AMD EPYC processors. We are now expanding our confidential computing capabilities into AI workloads with the new Azure confidential VMs with NVIDIA H100 Tensor Core GPUs and 4th Gen AMD EPYC CPUs, the industry's first offering of a confidential AI service. We are excited to expand our confidential computing offerings with Azure to address demands of AI workloads."&amp;nbsp; &lt;STRONG&gt;Ram Peddibhotla, corporate vice president, product management, cloud business, AMD.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" color="#2356EF"&gt;&lt;STRONG&gt;Customer use cases and feedback&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Some examples of workloads our customers have experimented with during the preview and planning further with the power of Azure NCC H100 v5 GPU virtual machine are:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Confidential inference on audio to text (Whisper models)&lt;/LI&gt;
&lt;LI&gt;Video input to detect anomaly behavior for incident prevention - leveraging confidential computing to meet data privacy.&lt;/LI&gt;
&lt;LI&gt;Stable diffusion with privacy sensitive design data in the automobile industry (inference &amp;amp; training)&lt;/LI&gt;
&lt;LI&gt;Multi-party clean rooms to run analytical tasks against billions of transactions and terabytes of data of financial institute and its subsidiaries.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse;" border="0" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;Advancing AI securely is core to our mission, and we were pleased to collaborate with Azure confidential computing to validate and test Confidential Inference for our audio-to-text Whisper models on Nvidia GPUs. &lt;BR /&gt;&lt;STRONG&gt;Matthew Knight, Head of Security, OpenAI&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;
&lt;P&gt;F5 can leverage Microsoft&amp;nbsp;Azure&amp;nbsp;Confidential&amp;nbsp;VMs with NVIDIA&amp;nbsp;H100 Tensor Core&amp;nbsp;GPUs to develop&amp;nbsp;and deploy&amp;nbsp;GenAI models. While the&amp;nbsp;AI model learns&amp;nbsp;from&amp;nbsp;private data, the underlying information remains encrypted within the Trusted Execution Environments (TEEs). This solution allows&amp;nbsp;us to build&amp;nbsp;advanced AI-powered security solutions, while ensuring confidentiality of the data our models&amp;nbsp;are&amp;nbsp;analyzing. This bolsters customer trust&amp;nbsp;and strengthens&amp;nbsp;our position&amp;nbsp;as&amp;nbsp;a&amp;nbsp;leader in secure&amp;nbsp;network&amp;nbsp;protection. Azure&amp;nbsp;confidential&amp;nbsp;computing&amp;nbsp;helps us build a better, more secure, and more innovative digital world.&lt;/P&gt;
&lt;STRONG&gt;Arul Elumalai, SVP &amp;amp; GM, Distributed Cloud Platform &amp;amp; Security Services, F5, Inc.&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;
&lt;P&gt;ServiceNow works closely with Microsoft, NVIDIA, and Opaque to put AI to work for people and deliver great experiences to both customers and employees on the Now Platform. The partnership between Opaque and Microsoft allows us to quickly deploy and leverage the power of Azure confidential VMs with NVIDIA H100 Tensor Core GPUs to deliver confidential AI with verifiable data privacy and security.&lt;/P&gt;
&lt;STRONG&gt;Kellie Romack, Chief Digital Information Officer, ServiceNow&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;
&lt;P&gt;The integration of the Opaque platform with Azure confidential VMs with NVIDIA H100 Tensor Core GPUs to create Confidential AI makes AI adoption faster and easier by helping to eliminate data sovereignty and privacy concerns. Confidential AI is the future of AI deployments, and with Opaque, Microsoft Azure, and NVIDIA, we're making this future a reality today.&lt;/P&gt;
&lt;STRONG&gt;Aaron Fulkerson, CEO, Opaque Systems&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;
&lt;P&gt;Leveraging the power of the preview of the Azure confidential VMs with NVIDIA H100 Tensor Core GPUs, our team has successfully integrated 'Constellation', a Kubernetes distribution focused on Confidential Computing, with GPU capabilities. This allows customers to lift and shift even sophisticated AI stacks to Azure confidential computing. With 'Continuum AI', we've created a framework for the end-to-end confidential serving of LLMs that ensures the utmost privacy of data, setting a new standard in AI inference solutions. We are thrilled to partner with Azure confidential computing to uncover the transformative potential of Confidential Computing, especially in the era of generative AI.&lt;/P&gt;
&lt;STRONG&gt;Felix Schuster, CEO and co-founder, Edgeless Systems&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 25%; border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;&lt;img /&gt;&lt;/TD&gt;
&lt;TD style="border-top: 1px solid; border-bottom: 1px solid; border-left: 0; border-right: 0;"&gt;
&lt;P&gt;Cyborg is excited to collaborate with Azure in previewing Azure confidential VMs with NVIDIA H100 Tensor Core GPUs. This partnership allows us to leverage GPU acceleration for our Confidential Vector Search algorithm, maintaining the highest degree of security while readying it for the stringent performance requirements of AI applications. We eagerly await the general availability of this VM SKU as we prepare to deploy our production-grade service.&lt;/P&gt;
&lt;STRONG&gt;Nicolas Dupont, CEO, Cyborg&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;“RBC has been working very closely with Microsoft on confidential computing initiatives since the early days of technology availability within Azure,” said &lt;STRONG&gt;Justin Simonelis, Director, Service Engineering and Confidential Computing, RBC.&lt;/STRONG&gt; &amp;nbsp;“We’ve leveraged the benefits of confidential computing and integrated it into our own data clean room platform known a Arxis. As we continue to develop our platform capabilities, we fully recognize the importance of privacy preserving machine learning inference and training to protect sensitive customer data within GPUs and look forward to leveraging Azure confidential VMs with NVIDIA H100 Tensor Core GPUs.”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" color="#2356EF"&gt;&lt;STRONG&gt;Performance insights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Azure confidential VMs with NVIDIA H100 Tensor core GPUs offer best-in-class performance for inferencing small-to-medium sized models while protecting code and data throughout their lifecycle. We have benchmarked these VMs across a variety of models using vLLM.&lt;/P&gt;
&lt;P&gt;The table below shows configuration for the tests:&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="186"&gt;
&lt;P&gt;VM Configuration&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="408"&gt;
&lt;P&gt;vCPUs – 40 cores&lt;/P&gt;
&lt;P&gt;GPU - 1&lt;/P&gt;
&lt;P&gt;Memory – 320GB&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186"&gt;
&lt;P&gt;Operating System&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="408"&gt;
&lt;P&gt;Ubuntu 22.04.4 LTS (6.5.0-1023-azure)&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186"&gt;
&lt;P&gt;GPU driver version&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="408"&gt;
&lt;P&gt;550.90.07&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186"&gt;
&lt;P&gt;GPU vBIOS version&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="408"&gt;
&lt;P&gt;96.00.88.00.11&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The figure above shows the overheads of confidential computing, with and without CUDA graph enabled.&amp;nbsp; For most models, the overheads are negligible. For smaller models, the overheads are higher due to increased latency of encrypting PCIe traffic and kernel invocations. Increasing the batch size or input token length is a viable strategy to mitigate confidential computing overhead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" color="#2356EF"&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/gpu-options" target="_self"&gt;Azure confidential GPU Options&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;&lt;A href="https://aka.ms/ConfidentialInferencingBlog" target="_blank" rel="noopener"&gt;Azure AI Confidential Inferencing Preview&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;&lt;A href="https://aka.ms/ConfidentialEndpointTechBlog" target="_blank" rel="noopener"&gt;Azure AI Confidential Inferencing: Technical Deep-Dive&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 14:40:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/general-availability-azure-confidential-vms-with-nvidia-h100/ba-p/4242644</guid>
      <dc:creator>Krishnaprasad_Hande</dc:creator>
      <dc:date>2024-09-24T14:40:58Z</dc:date>
    </item>
    <item>
      <title>Azure AI Confidential Inferencing: Technical Deep-Dive</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-ai-confidential-inferencing-technical-deep-dive/ba-p/4253150</link>
      <description>&lt;P class="lia-align-left"&gt;Generative AI powered by Large Language Models (LLMs) has revolutionized the way we interact with technology. Through chatbots, Copilot, and agents, AI is amplifying human productivity across sectors such as healthcare, finance, government, and cybersecurity. Microsoft’s AI platform has been at the forefront of this revolution, supporting state-of-the-art AI models, enabling organizations to differentiate with their business, by enabling developers to deploy AI applications at scale.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;At Microsoft, we recognize the trust that consumers and enterprises place in our cloud platform as they integrate our AI services into their workflows. We believe all use of AI must be grounded in the principles of responsible AI – fairness, reliability and safety, privacy and security, inclusiveness, transparency, and accountability. Microsoft’s commitment to these principles is reflected in Azure AI’s strict data security and privacy policy, and the suite of responsible AI tools supported in Azure AI, such as fairness assessments and tools for improving interpretability of models. Whether you’re using Microsoft 365 copilot, a Copilot+ PC, or building your own copilot, you can trust that Microsoft’s responsible AI principles extend to your data as part of your AI transformation. For example, your data is never shared with other customers or used to train our foundational models.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;A title="Confidential Computing Consortium" href="https://confidentialcomputing.io/" target="_blank" rel="noopener"&gt;Confidential computing&lt;/A&gt; is a set of hardware-based technologies that help protect data throughout its lifecycle, including when data is in use. This complements existing methods to protect data at rest on disk and in transit on the network. Confidential computing uses hardware-based &lt;A href="https://en.wikipedia.org/wiki/Trusted_execution_environment" target="_blank" rel="noopener"&gt;Trusted Execution Environments&lt;/A&gt; (TEEs) to isolate workloads that process customer data from all other software running on the system, including other tenants’ workloads and even our own infrastructure and administrators. Crucially, thanks to remote attestation, users of services hosted in TEEs can verify that their data is only processed for the intended purpose.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;We foresee that all cloud computing will eventually be confidential. Our vision is to transform the Azure cloud into the Azure confidential cloud, empowering customers to achieve the highest levels of privacy and security for all their workloads. Over the last decade, we have worked closely with hardware partners such as Intel, AMD, Arm and NVIDIA to integrate confidential computing into all modern hardware including CPUs and GPUs. We have taken a full stack approach across infrastructure, containers, and services. We have the most comprehensive IaaS, PaaS and developer offerings&amp;nbsp;including &lt;A title="Azure Confidential VMs" href="https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview" target="_blank" rel="noopener"&gt;Confidential VMs&lt;/A&gt;, &lt;A title="Confidential Containers on ACI" href="https://learn.microsoft.com/en-us/azure/container-instances/container-instances-confidential-overview" target="_blank" rel="noopener"&gt;Confidential Containers on ACI&lt;/A&gt; and &lt;A title="Confidential Containers on AKS" href="https://learn.microsoft.com/en-us/azure/aks/confidential-containers-overview" target="_blank" rel="noopener"&gt;AKS&lt;/A&gt;, &lt;A title="Microsoft Azure Attestation" href="https://learn.microsoft.com/en-us/azure/attestation/overview" target="_blank" rel="noopener"&gt;Microsoft Azure Attestation&lt;/A&gt; and &lt;A title="Azure Key Vault managed HSM" href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/overview" target="_blank" rel="noopener"&gt;Azure Key Vault managed HSMs&lt;/A&gt;, &lt;A title="Azure Confidential Ledger" href="https://learn.microsoft.com/en-us/azure/confidential-ledger/overview" target="_blank" rel="noopener"&gt;Azure Confidential Ledger,&lt;/A&gt; and &lt;A title="SQL Server Always Encrypted" href="https://learn.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?view=sql-server-ver16" target="_blank" rel="noopener"&gt;SQL Server Always Encrypted&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Our approach is rooted in hardware-based TEEs, in industry standards such as &lt;A title="Entity Attestation Token " href="https://datatracker.ietf.org/doc/draft-ietf-rats-eat" target="_blank" rel="noopener"&gt;EAT&lt;/A&gt;, &lt;A title="Supply Chain Integrity, Transparency and Trust" href="https://datatracker.ietf.org/wg/scitt/about/" target="_blank" rel="noopener"&gt;SCITT&lt;/A&gt; and &lt;A title="TEE Device Interface Security Protocol" href="https://pcisig.com/tee-device-interface-security-protocol-tdisp" target="_blank" rel="noopener"&gt;TDISP&lt;/A&gt; which we have helped define, and in open source hardware (e.g., the &lt;A title="Caliptra, the open RTL root of trust" href="https://caliptra.io/" target="_blank" rel="noopener"&gt;Caliptra&lt;/A&gt; root of trust) and software (e.g. the &lt;A href="https://techcommunity.microsoft.com/t5/windows-os-platform-blog/openhcl-evolving-azure-s-virtualization-model/ba-p/4248345" target="_blank" rel="noopener"&gt;OpenHCL paravisor&lt;/A&gt; for confidential VMs). In fact, as part of our &lt;A title="The Secure Future Initiative" href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/" target="_blank" rel="noopener"&gt;Secure Future Initiative&lt;/A&gt;, we have committed to protect Azure’s own infrastructure and services using confidential computing.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Azure AI Confidential Inferencing&lt;/H1&gt;
&lt;P class="lia-align-left"&gt;The Azure OpenAI Service team just announced the upcoming &lt;A href="https://aka.ms/ConfidentialInferencingBlog" target="_blank" rel="noopener"&gt;preview of confidential inferencing&lt;/A&gt;, our first step towards confidential AI as a service (you can &lt;A href="https://aka.ms/ConfidentialInferencingSignUp" target="_blank" rel="noopener"&gt;sign up for the preview here&lt;/A&gt;). While it is already possible to build an inference service with &lt;A href="https://aka.ms/CVM-H100-GA" target="_blank" rel="noopener"&gt;Confidential GPU VMs&lt;/A&gt; (which are moving to general availability for the occasion), most application developers prefer to use model-as-a-service APIs for their convenience, scalability and cost efficiency. &amp;nbsp;Our goal with confidential inferencing is to provide those benefits with the following additional security and privacy goals:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;&lt;STRONG&gt;End-to-end prompt protection.&lt;/STRONG&gt; Clients submit encrypted prompts that can only be decrypted within inferencing TEEs (spanning both CPU and GPU), where they are protected from unauthorized access or tampering even by Microsoft. All intermediate services (frontends, load balancers, etc.) only see the encrypted prompts and completions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Stateless processing&lt;/STRONG&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;User prompts are used only for inferencing within TEEs. The prompts and completions are not stored, logged, or used for any other purpose such as debugging or training.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;User anonymity.&lt;/STRONG&gt; Users can remain anonymous while interacting with AI models.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Remote verifiability.&lt;/STRONG&gt; Users can independently and cryptographically verify our privacy claims using evidence rooted in hardware.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;&lt;STRONG&gt;Transparency. &lt;/STRONG&gt;All artifacts that govern or have access to prompts and completions are recorded on a tamper-proof, verifiable transparency ledger. External auditors can review any version of these artifacts and report any vulnerability to our&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/msrc/bounty" target="_blank" rel="noopener"&gt;Microsoft Bug Bounty program&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;These goals are a significant leap forward for the industry by providing verifiable&amp;nbsp;technical evidence that data is only processed for the intended purposes (on top of the legal protection our&amp;nbsp;&lt;A title="Azure OpenAI Data Privacy" href="https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy" target="_self"&gt;data privacy policies&lt;/A&gt;&amp;nbsp;already provides), thus greatly reducing the need for users to trust our infrastructure and operators. The hardware isolation of TEEs also makes it harder for hackers to steal data even if they compromise our infrastructure or admin accounts. Lastly, since our technical evidence is universally verifiability, developers can build AI applications that provide the same privacy guarantees to their users.&amp;nbsp;Throughout the rest of this blog, we explain how Microsoft plans to implement and operationalize these confidential inferencing requirements.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;How Confidential Inferencing Works&lt;/H1&gt;
&lt;img&gt;Architecture of Azure AI confidential inferencing&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Architecture&lt;/H2&gt;
&lt;P&gt;Confidential inferencing provides end-to-end verifiable protection of prompts using the following building blocks:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;Inference runs in &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/gpu-options" target="_blank" rel="noopener"&gt;Azure Confidential GPU VMs&lt;/A&gt;&amp;nbsp;created with an integrity-protected disk image, which includes a container runtime to load the various containers required for inference.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;The node agent in the VM enforces a policy over deployments that verifies the integrity and transparency of containers launched in the TEE.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;An immutable, append-only transparency ledger records the container hashes and policies that have been deployed to the service, with additional auditing information when available such as pointers to container registries, SBOMs, sources, CI/CD logs, etc.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.ietf.org/rfc/rfc9458.html" target="_blank" rel="noopener"&gt;Oblivious HTTP&lt;/A&gt; (OHTTP) is used to encrypt the prompt from the client to the TEE, ensuring our untrusted services between the client and the TEE (TLS termination, load balancing, DoS protection, authentication, billing) only see encrypted prompts and completions.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;A confidential and transparent key management service (KMS) generates and periodically rotates OHTTP keys. It releases private keys to confidential GPU VMs after verifying that they meet the transparent key release policy for confidential inferencing. Clients get the current set of OHTTP public keys and verify associated evidence that keys are managed by the trustworthy KMS before sending the encrypted request.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;The client application may optionally use an OHTTP proxy outside of Azure to provide stronger unlinkability between clients and inference requests.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Attested Oblivious HTTP&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;The simplest way to achieve end-to-end confidentiality is for the client to encrypt each prompt with a public key that has been generated and attested by the inference TEE. Usually, this can be achieved by creating a direct transport layer security (TLS) session from the client to an inference TEE. But there are several operational constraints that make this impractical for large scale AI services. For example, efficiency and elasticity require smart layer 7 load balancing, with TLS sessions terminating in the load balancer. Therefore, we opted to use application-level encryption to protect the prompt as it travels through untrusted frontend and load balancing layers.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Oblivious HTTP (OHTTP, &lt;A href="https://www.rfc-editor.org/rfc/rfc9458.html" target="_blank" rel="noopener"&gt;RFC9458&lt;/A&gt;) is a standard protocol that achieves this goal: a client serializes and seals the real inference request (including the prompt) with HPKE (&lt;A href="https://www.rfc-editor.org/rfc/rfc9180.html" target="_blank" rel="noopener"&gt;RFC9180&lt;/A&gt;), a standard message sealing algorithm that uses Diffie-Hellman public shares to represent the recipient’s identity, and sends it as an encapsulated request (visible to the untrusted TLS terminator, load balancer, ingress controllers, etc.).&amp;nbsp;Even though all clients use the same public key, each HPKE sealing operation generates a fresh client share, so requests are encrypted independently of each other. Requests can be served by any of the TEEs that is granted access to the corresponding private key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;To submit a confidential inferencing request, a client obtains the current HPKE public key from the KMS, along with hardware attestation evidence proving the key was securely generated and transparency evidence binding the key to the current secure key release policy of the inference service (which defines the required attestation attributes of a TEE to be granted access to the private key). Clients verify this evidence before sending their HPKE-sealed inference request with OHTTP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Inbound requests are processed by Azure ML’s load balancers and routers, which authenticate and route them to one of the Confidential GPU VMs currently available to serve the request.&amp;nbsp;Within the TEE, our OHTTP gateway decrypts the request before passing it to the main inference container. If the gateway sees a request encrypted with a key identifier it hasn't cached yet, it must obtain the private key from the KMS. To this end, it gets an attestation token from the Microsoft Azure Attestation (MAA) service and presents it to the KMS. If the attestation token meets the key release policy bound to the key, it gets back the HPKE private key wrapped under the attested vTPM key.&amp;nbsp;When the OHTTP gateway receives a completion from the inferencing containers, it encrypts the completion using a previously established HPKE context, and sends the encrypted completion to the client, which can locally decrypt it.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Azure Confidential GPU VMs&lt;/H2&gt;
&lt;img&gt;Internal architecture of confidential GPU VMs with H100 Tensor Core GPUs&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;In confidential inferencing, all services that require access to prompts in cleartext are hosted in Azure Confidential GPU VMs. These VMs combine SEV-SNP capabilities in 4&lt;SUP&gt;th&lt;/SUP&gt; Generation AMD EPYC processors and confidential computing primitives in NVIDIA H100 Tensor Core GPUs to create a unified Trusted Execution Environment (TEE) across the CPU and GPU. These VMs enable deployment of high-performance AI workloads while significantly in Azure infrastructure and admins. In a Confidential GPU VM, all code and data (including keys, prompts, and completions) remains encrypted in CPU memory and when they are transferred between the CPU and GPU over the PCIe bus. The data is decrypted only within the CPU package and the on-package High-Bandwidth Memory (HBM) in the GPU, where it remains protected even from privileged access using hardware firewalls.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Azure Confidential GPU VMs support a two-phase attestation protocol. When a Confidential GPU VM starts, it boots into a layer of Microsoft-provided firmware known as the Hardware Compatibility Layer (see the recent&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-os-platform-blog/openhcl-evolving-azure-s-virtualization-model/ba-p/4248345" target="_blank" rel="noopener"&gt;OpenHCL blog&lt;/A&gt; for details). The HCL is measured by the Platform Security Processor (PSP), the hardware root of trust in the AMD EPYC processors. The measurement is included in SEV-SNP attestation reports signed by the PSP using a processor and firmware specific VCEK key. HCL implements a virtual TPM (vTPM) and captures measurements of early boot components including initrd and the kernel into the vTPM. These measurements are available in the vTPM attestation report, which can be presented along SEV-SNP attestation report to attestation services such as MAA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;When the GPU driver within the VM is loaded, it establishes trust with the GPU using &lt;A href="https://www.dmtf.org/standards/SPDM" target="_blank" rel="noopener"&gt;SPDM&lt;/A&gt; based attestation and key exchange. The driver obtains an attestation report from the GPU’s hardware root-of-trust containing measurements of GPU firmware, driver micro-code, and GPU configuration. This report is signed using a per-boot attestation key rooted in a unique per-device key provisioned by NVIDIA during manufacturing. After authenticating the report, the driver and the GPU utilize keys derived from the SPDM session to encrypt all subsequent code and data transfers between the driver and the GPU.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Applications within the VM can independently attest the assigned GPU using a local GPU verifier. The verifier validates the attestation reports, checks the measurements in the report against reference integrity measurements (RIMs) obtained from NVIDIA’s RIM and OCSP services, and enables the GPU for compute offload. When the VM is destroyed or shutdown, all content in the VM’s memory is scrubbed. Similarly, all sensitive state in the GPU is scrubbed when the GPU is reset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Hardened VM Images&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing will further reduce trust in service administrators by utilizing a purpose built and hardened VM image. In addition to OS and GPU driver, the VM image contains a minimal set of components required to host inference, including a hardened container runtime to run containerized workloads. The root partition in the image is integrity-protected using dm-verity, which constructs a Merkle tree over all blocks in the root partition, and stores the Merkle tree in a separate partition in the image. During boot, a PCR of the vTPM is extended with the root of this Merkle tree, and later verified by the KMS before releasing the HPKE private key. All subsequent reads from the root partition are checked against the Merkle tree. This ensures that the entire contents of the root partition are attested and any attempt to tamper with the root partition is detected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Container Execution Policies&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;Much like many modern services, confidential inferencing deploys models and containerized workloads in VMs orchestrated using Kubernetes. However, this places a significant amount of trust in Kubernetes service administrators, the control plane including the API server, services such as Ingress, and cloud services such as load balancers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing reduces trust in these infrastructure services with a container execution policies that restricts the control plane actions to a precisely defined set of deployment commands. In particular,&amp;nbsp;this policy defines the set of container images that can be deployed in an instance of the endpoint, along with each container’s configuration (e.g. command, environment variables, mounts, privileges).&amp;nbsp;The policy is measured into a PCR of the Confidential VM's vTPM (which is matched in the key release policy on the KMS with the expected policy hash for the deployment) and enforced by a hardened container runtime hosted within each instance. The runtime monitors commands from the Kubernetes control plane, and ensures that only commands consistent with attested policy are permitted. This prevents entities outside the TEEs to inject malicious code or configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Stateless Processing&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing adheres to the principle of stateless processing. Our services are carefully designed to use prompts only for inferencing, return the completion to the user, and discard the prompts when inferencing is complete. The prompts (or any sensitive data derived from prompts) will not be available to any other entity outside authorized TEEs.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing minimizes side-effects of inferencing by hosting containers in a sandboxed environment. For example, inferencing containers are deployed with limited privileges. All traffic to and from the inferencing containers is routed through the OHTTP gateway, which limits outbound communication to other attested services. We also mitigate side-effects on the filesystem by mounting it in read-only mode with dm-verity (though some of the models use non-persistent scratch space created as a RAM disk).&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Some benign side-effects are essential for running a high performance and a reliable inferencing service. For example, our billing service requires knowledge of the size (but not the content) of the completions, health and liveness probes are required for reliability, and caching some state in the inferencing service (e.g. the attention KV) or in hardware (e.g. L3 cache) is necessary for competitive performance. All such side effects are implemented in attested and transparent code and are subject to independent review. We are also&amp;nbsp;actively &lt;A href="https://www.microsoft.com/en-us/research/project/venice/" target="_blank" rel="noopener"&gt;conducting research&lt;/A&gt; to understand and effectively mitigate any security risks arising through these side-effects.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Confidential and Transparent Keying&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;Clients of confidential inferencing get the public HPKE keys to encrypt their inference request from a confidential and transparent key management service (KMS). The KMS ensures that private HPKE keys are securely generated, stored, periodically rotated, and released only to Azure Confidential GPU VMs hosting a transparent software stack.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The release of private HPKE keys is governed by key release policies. When a Confidential GPU VM requests a private HPKE key, it presents an attestation token issued by MAA that includes measurements of its TPM PCRs. The KMS validates this attestation token against the key release policy and wraps the private HPKE key with a wrapping key generated and only accessible by the Confidential GPU VM. Key wrapping protects the private HPKE key in transit and ensures that only attested VMs that meet the key release policy can unwrap the private key.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The KMS permits service administrators to make changes to key release policies e.g., when the Trusted Computing Base (TCB) requires servicing. However,&amp;nbsp;all changes to the key release policies will be recorded in a transparency ledger. External auditors will be able to obtain a copy of the ledger, independently verify the entire history of key release policies, and hold service administrators accountable.&amp;nbsp;When clients request the current public key, the KMS also returns evidence (attestation and transparency receipts) that the key was generated within and managed by the KMS, for the current key release policy. Clients of the endpoint (e.g., the OHTTP proxy) can verify this evidence before using the key for encrypting prompts.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Using a confidential KMS allows us to support complex confidential inferencing services composed of multiple micro-services, and models that require multiple nodes for inferencing. For example, an audio transcription service may consist of two micro-services, a pre-processing service that converts raw audio into a format that improve model efficiency, and a model that transcribes the resulting stream. Most language models rely on a Azure AI Content Safety service consisting of an ensemble of models to filter harmful content from prompts and completions. Each of these services can obtain service-specific HPKE keys from the KMS after attestation, and use these keys for securing all inter-service communication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;User Anonymity&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;In addition to protection of prompts, confidential inferencing can protect the identity of individual users of the inference service by routing their requests through an OHTTP proxy outside of Azure, and thus hide their IP addresses from Azure AI. Enterprise users can set up their own OHTTP proxy to authenticate users and inject a tenant level authentication token into the request. This allows confidential inferencing to authenticate requests and perform accounting tasks such as billing without learning about the identity of individual users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Transparency&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing is hosted in Confidential VMs with a hardened and fully attested TCB. As with other software service, this TCB evolves over time due to upgrades and bug fixes. Some of these fixes may need to be applied urgently e.g., to address a zero-day vulnerability. It is impractical to wait for all users to review and approve every upgrade before it is deployed, especially for a SaaS service shared by many users.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Our solution to this problem is to allow updates to the service code at any point, as long as the update is made transparent first (as explained in &lt;A title="Why Should I Trust Your Code?" href="https://cacm.acm.org/practice/why-should-i-trust-your-code/" target="_blank" rel="noopener"&gt;our recent CACM article&lt;/A&gt;) by adding it to a tamper-proof, verifiable transparency ledger. This provides two critical properties: first, all users of the service are served the same code and policies, so we cannot target specific customers with bad code without being caught. Second, every version we deploy is auditable by any user or third party. Although we aim to provide source-level transparency as much as possible (using reproducible builds or attested build environments), this is not always possible (for instance, some OpenAI models use proprietary inference code). In such cases, we may have to fall back to properties of the attested sandbox (e.g. limited network and disk I/O) to prove the code doesn't leak data.&amp;nbsp;All claims registered on the ledger will be digitally signed to ensure authenticity and accountability. Incorrect claims in records can always be attributed to specific entities at Microsoft. &amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;When an instance of confidential inferencing requires access to private HPKE key from the KMS, it will be required to produce receipts from the ledger proving that the VM image and the container policy have been registered. Therefore, when users verify public keys from the KMS, they are guaranteed that the KMS will only release private keys to instances whose TCB is registered with the transparency ledger.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Confidential inferencing will ensure that prompts are processed only by transparent models. Azure AI will register models used in Confidential Inferencing in the transparency ledger along with a model card. Instances of confidential inferencing will verify receipts before loading a model. Receipts will be returned along with completions so that clients have a record of specific model(s) which processed their prompts and completions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Roadmap and Resources&lt;/H1&gt;
&lt;P class="lia-align-left"&gt;Confidential inferencing is a reaffirmation of Microsoft’s commitment to the &lt;A title="The Secure Future Initiative" href="https://www.microsoft.com/en-us/microsoft-cloud/resources/secure-future-initiative" target="_blank" rel="noopener"&gt;Secure Future Initiative&lt;/A&gt; and our &lt;A title="Responsible AI Principles at Microsoft" href="https://www.microsoft.com/en-us/ai/responsible-ai" target="_blank" rel="noopener"&gt;Responsible AI principles&lt;/A&gt;. It brings together state-of-the-art AI models and Azure infrastructure, with cutting edge confidential computing in Azure Confidential GPU VMs based on AMD SEV-SNP and NVIDIA H100 Tensor Core GPUs to deliver end-to-end, independently verifiable privacy.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;We will continue to work closely with our hardware partners to deliver the full capabilities of confidential computing. We will make confidential inferencing more open and transparent as we expand the technology to support a broader range of models and other scenarios such as confidential Retrieval-Augmented Generation (RAG), confidential fine-tuning, and confidential model pre-training.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Learn more about the&amp;nbsp;&lt;A title="Azure&amp;nbsp;AI Confidential inferencing Preview" href="https://aka.ms/ConfidentialInferencingBlog" target="_blank" rel="noopener"&gt;Azure&amp;nbsp;AI Confidential inferencing Preview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Sign up for the preview by &lt;A title="Signup for for confidential inference preview" href="https://aka.ms/ConfidentialInferencingSignUp" target="_blank" rel="noopener"&gt;filling this form&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn about the &lt;A title="Confidential GPU VMs now generally available" href="https://aka.ms/cvm-h100-ga" target="_blank" rel="noopener"&gt;general availability of Azure Confidential GPU VMs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Discover our full range of Azure Confidential Computing solutions &lt;A href="https://azure.microsoft.com/en-us/solutions/confidential-compute/?msockid=0c3fe6066c02688e0221f5b36d056916" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 17:33:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/azure-ai-confidential-inferencing-technical-deep-dive/ba-p/4253150</guid>
      <dc:creator>MarkRussinovich</dc:creator>
      <dc:date>2025-12-16T17:33:48Z</dc:date>
    </item>
    <item>
      <title>Verify the integrity of Azure Confidential Ledger transactions with receipts and application claims</title>
      <link>https://techcommunity.microsoft.com/t5/azure-confidential-computing/verify-the-integrity-of-azure-confidential-ledger-transactions/ba-p/4190158</link>
      <description>&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;In today's digital landscape, the integrity and confidentiality of transactional data are paramount. &lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/products/azure-confidential-ledger/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft’s Azure Confidential Ledger&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; offers a robust solution for maintaining the privacy and confidentiality of your data. The service utilizes cryptographic techniques to generate transaction receipts, which serve as immutable evidence of the ledger's state at a specific point in time. These receipts are crucial for businesses that require a high level of trust and transparency in their operations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-justify" aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Write receipts&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;The value proposition of Azure Confidential Ledger &lt;/SPAN&gt;&lt;A href="https://microsoft.github.io/CCF/main/use_apps/verify_tx.html#write-receipts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;write receipts&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; lies in their ability to provide a verifiable trail of all write transactions. Azure Confidential Ledger leverages the &lt;/SPAN&gt;&lt;A href="https://ccf.dev/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Confidential Consortium Framework (CCF)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, which ensures the integrity of transactions by using a &lt;/SPAN&gt;&lt;A href="https://wikipedia.org/wiki/Merkle_tree" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Merkle tree&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; data structure to store the hash of all transaction blocks that are added to the immutable ledger.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;How write transactions are recorded in the ledger using an &lt;/SPAN&gt;&lt;/I&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://microsoft.github.io/CCF/main/architecture/merkle_tree.html" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;internal Merkle Tree&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt; data structure in CCF.&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;When a write transaction is completed, Azure Confidential Ledger users can obtain a cryptographic Merkle proof, or receipt, over the entry created in a Confidential Ledger to check that the write operation was recorded correctly. A write transaction receipt is evidence that the system has committed the corresponding transaction and can be used to confirm that the entry has been successfully appended to the ledger. This ensures that once a transaction has been committed to the ledger, it cannot be altered or deleted without detection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;For more details on Azure Confidential Ledger write receipts, their structure, and how to get a receipt from an active ledger, please refer to this &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/write-transaction-receipts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;dedicated article&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-justify"&gt;Application claims&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;A href="https://microsoft.github.io/CCF/main/use_apps/verify_tx.html#application-claims" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Application claims&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; take receipts a step further by allowing users to attach arbitrary metadata to a transaction, which are eventually reflected in write receipt response payloads. This metadata includes details specific to the transaction's context, such as the collection ID and the input content of a write operation. The application claims of a write transaction ensure that the claims digest is signed securely and stored together with the transaction itself, meaning that it cannot be tampered with once the transaction is committed.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;BR /&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Example of an application claim attached to a write receipt response payload.&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;Later, the application claims in plain format are shown in the receipt payload for the same transaction where they were added. Using the claims in plain format, users can &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/verify-write-transaction-receipts#verify-application-claims-digest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;recalculate the same claims digest&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (available in the write receipt) that the ledger signed in place during the transaction to verify the claim authenticity. The claims digest can help verify the write transaction receipt, giving an offline way for users to check the authenticity of the recorded claims.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;By leveraging application claims, organizations can tailor the ledger to their specific needs, enhancing the utility and relevance of the data stored within receipts. Application claims are currently supported in the &lt;/SPAN&gt;&lt;A href="https://github.com/Azure/azure-rest-api-specs/tree/main/specification/confidentialledger/data-plane/Microsoft.ConfidentialLedger/preview/2023-01-18-preview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Azure Confidential Ledger preview&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN data-contrast="none"&gt;API version &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;2023-01-18-preview&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; and their current format is documented in &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/write-transaction-receipts#application-claims" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;this article&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-justify" aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Receipts and claims verification&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;The process of &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/verify-write-transaction-receipts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;verifying write transaction receipts and application claims&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; is straightforward and secure. Utilizing cryptographic proofs, users can independently confirm the authenticity and integrity of each transaction offline, without having to connect to the ledger or trust any central authority.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;The &lt;/SPAN&gt;&lt;A href="https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/confidentialledger/azure-confidentialledger" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Azure Confidential Ledger client library for Python&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; offers useful functions to validate receipts of write transactions and calculate the claims digest from a list of application claims in an easy and seamless manner. With this verification utility, any write receipt from a Confidential Ledger service can be verified with ease and any application claims associated with the transaction can be fully authenticated.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;from azure.identity import DefaultAzureCredential
from azure.confidentialledger import ConfidentialLedgerClient
from azure.confidentialledger.certificate import (
    ConfidentialLedgerCertificateClient,
)
from azure.confidentialledger.receipt import (
    verify_receipt,
)

LEDGER_ID = "acl-test-ledger"  # Replace with the ID of the ledger to get the receipt from.
TRANSACTION_ID = "2.50"  # Replace with the ID of the transaction to get the receipt for.
API_VERSION = "2023-01-18-preview"  # Use this API version for application claims support.

# Build a ConfidentialLedgerClient object through AAD.
ledger_client = ConfidentialLedgerClient(
    f"https://{LEDGER_ID}.confidential-ledger.azure.com",
    credential=DefaultAzureCredential(),
    ledger_certificate_path="service_cert.pem",
    api_version=API_VERSION,
)

### We assume that the target transaction has been committed to the ledger in a previous step. 
### Please refer to the Azure Confidential Ledger Python SDK samples and documentation 
### for details on how to create an entry and wait for it to be committed.

# Get a receipt from the ledger for the input transaction.
poller = ledger_client.begin_get_receipt(TRANSACTION_ID)
get_receipt_response = poller.result()
print(get_receipt_response)

try:
    # Verify the contents of the receipt, with optional application claims (if any)
    verify_receipt(
        get_receipt_response["receipt"],
        ConfidentialLedgerCertificateClient().get_ledger_identity(LEDGER_ID).get("ledgerTlsCertificate"),
        application_claims=get_receipt_response.get("applicationClaims", None),
    )
    print(f"Receipt for transaction id {TRANSACTION_ID} successfully verified")
except ValueError:
    print(f"Receipt verification for transaction id {TRANSACTION_ID} failed")
    raise
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;How to verify receipts (with optional application claims) using the Azure Confidential Ledger Python SDK.&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;LI-WRAPPER&gt;&lt;I&gt;&lt;/I&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;The decentralized and offline approach to verification bolsters the security and reliability of the system, making Azure Confidential Ledger an ideal platform for applications that demand the highest levels of data integrity. To learn more about the Data Plane Python SDK and its receipt verification utilities, check out &lt;/SPAN&gt;&lt;A href="https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/confidentialledger/azure-confidentialledger#verify-write-transaction-receipts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;this section&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and &lt;/SPAN&gt;&lt;A href="https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/confidentialledger/azure-confidentialledger/samples/get_and_verify_receipt.py" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;the full sample code&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-justify" aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Conclusion&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;In conclusion, Azure Confidential Ledger's receipts and application claims offer a compelling value proposition for organizations looking to secure their transactional data. With its strong focus on integrity, confidentiality, and verifiability, Azure Confidential Ledger stands out as a leading solution in the realm of confidential computing. Whether you are managing financial transactions, supply chain management, or any other data-sensitive operation, Azure Confidential Ledger provides the assurance that your data remains untampered and trustworthy through transaction receipts and application claims.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-justify" aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Resources&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;For getting started with Azure confidential ledger write receipts and application claims, please refer to our documentation:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="lia-align-justify"&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/write-transaction-receipts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Azure Confidential Ledger write transaction receipts | Microsoft Learn&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI class="lia-align-justify" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/confidential-ledger/verify-write-transaction-receipts#verify-application-claims-digest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Verify Azure Confidential Ledger write transaction receipts | Microsoft Learn&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 15 Jul 2024 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-confidential-computing/verify-the-integrity-of-azure-confidential-ledger-transactions/ba-p/4190158</guid>
      <dc:creator>ShubhraS</dc:creator>
      <dc:date>2024-07-15T15:00:00Z</dc:date>
    </item>
  </channel>
</rss>

