Microsoft is moving Confidential Containers in Azure Container Instances (ACI) from limited preview to public preview, one step closer to full general availability.
microsoft blog post (opens in new tab) Learn how this service takes advantage of Secure Encrypted Virtualization and Secure Nested Paging (SEV-SNP) on AMD’s latest chips designed for servers.
ACI Product Manager Peter Pogorski explained that while Azure customers are “increasingly looking to cloud-native, container-based applications to support their workloads,” they continue to demand high levels of data protection. I’m here.
Azure confidential container
“This serverless platform enables Linux containers to run inside a hardware-based authenticated Trusted Execution Environment (TEE), offering the simplicity of a serverless container platform and the enhanced security of confidential computing. ‘ sums up Pogorski.
Data in use can be protected in a confidential container by processing it in encrypted memory. Microsoft thanks AMD for providing his EPYC processors.
Confidential containers are designed to run with a verifiable initialization policy, allowing Azure customers to be confident that executed code is trusted and verified, eliminating unintended data leaks can.
For collaboration purposes, guests can also review the attestation report to ensure they are happy with the application running in the container group before committing to sharing sensitive information.
ACI currently supports batch processing, data processing pipelines, continuous integration, and more, but Microsoft believes confidential containers will open the service to many more scenarios.
in limited preview announcement (opens in new tab) Azure Confidential Computing Product Manager Amar Gowda said:
“We are excited to continue to innovate in the rapidly emerging space of confidential computing and cloud native while offering a confidential serverless service with full lift-and-shift container support. .”
While full general availability has not been officially announced, the rapid development suggests that confidential computing is important to many companies looking to optimize their IT.