Azure confidential computing
Azure confidential computing offers solutions to isolate your sensitive data while it's being processed. Learn how to deploy any application on confidential computing infrastructure by reading concepts, completing tutorials, and working with code samples.
- Azure confidential computing
- What is confidential computing?
- Why might I need it?
- How do I get it?
- Confidential virtual machines
- About Azure confidential VMs
- Azure confidential VM options
- FAQ for confidential VMs
- Guest attestation for confidential VMs
- About Azure confidential GPUs
- Microsoft Defender for Cloud integration
- Virtual TPMs in Azure confidential VMs
- Key rotation for Azure confidential VMs
- Use sample app with guest attestation
- Leverage virtual TPMs in Azure confidential VMs
- Create a custom image for a confidential VM
- Quickly create confidential VMs
- Image hardening techniques for deployment
- Secure Key Release SKR with Azure Key Vault
- Virtual machines with app enclaves
- Container compute
- Container solutions overview
- Application enclave nodes on AKS
- Confidential containers
- Confidential node pools on AKS
- References
- Confidential services
- Partner Solutions
- Confidential virtual machines
- Resources