Confidential Computing overview
Stay organized with collections
Save and categorize content based on your preferences.
Confidential Computing is the protection of data in-use with hardware-based
Trusted Execution Environment (TEE). TEEs are secure and isolated environments
that prevent unauthorized access or modification of applications and data while
they are in use. This security standard is defined by the
Confidential Computing Consortium.
End-to-end encryption
End-to-end encryption involves three states:
Encryption at rest protects your data while it is being stored.
Encryption in transit protects your data when it is moving between two
points.
Encryption in use protects your data while it is being processed.
Confidential Computing provides the last piece of end-to-end encryption:
encryption in use.
Confidential Computing services
Google Cloud offers the following Confidential Computing products:
Confidential VM is also available for use in the following products:
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-01-30 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-01-30 UTC."],[],[]]