+1 609-PRO-GURU
office@TheProjectManagement.Guru
0
Free Consultation
TheProjectManagement.GuruTheProjectManagement.Guru
  • Home
  • About Us
  • Services
  • Blog
  • Contact
Back
  • Home
  • About Us
  • Services
  • Blog
  • Contact
  • Home
  • Blog
  • Cybersecurity
  • Confidential Computing with TEEs: Protecting Data in Use

Cybersecurity

22 May

Confidential Computing with TEEs: Protecting Data in Use

  • By Kotesh Kommanaboyina
Confidential Computing with Trusted Execution Environments (TEEs)

Organizations operating in highly secure environments, such as the governments, military or defense industry, rely on confidential computing as a means to ensure security to all aspects of their operations including end-to-end computation process.

Confidential Computing with Trusted Execution Environments (TEEs)

In a Client/Server computing model, the client requests server to take some action on the client’s behalf – often a request from browser for server-side data.

In the process of serving the client’s request server may have to do the following:

  • Access data in a different storage environment
  • Perform computation on the data
  • Send the processed or refined data to client

Often computing models add a layer of security to the Client/Server request model. Applying encryption strategies to the data on the storage area to restrict unauthorized access from the individuals or processes is termed as protecting data at rest. Adding a layer of security to the network communications to restrict eavesdropping attacks between Client & Server and between Server & Storage is often called protecting data in motion or transit.

Traditionally, computation models ignored adding a security layer for the data that is being actively processed on the server’s memory.

Confidential Computing model insists adding a security layer to protect the code and data being processed in server memory which can be termed as protecting data in use emphasizing the use if TEEs (Trusted Execution Environments)

Trusted Execution Environment guarantee that no outside process can view or alter the data being handled with its’ environment.

What is a Trusted Execution Environment?

Data protection is ensured throughout the entire computation lifecycle with a Trusted Execution Environment which enhances the confidence and assurance of the computation model.

Tags:Computation ModelsConfidential ComputingCyber SecurityCybersecuritydata protectiondata securityEmerging Technologiesmemory encryptiontrusted execution environments
Avatar of Kotesh Kommanaboyina
Kotesh Kommanaboyina
MBA | PMP | PgMP | TOGAF® 9 Certified | SPC6

Share

Categories

  • Agile Project Management
  • Cybersecurity
  • Enterprise Architecture
  • Project Management
  • Scaled Agile Framework
  • TOGAF

Tags

Agile Project Management Cloud cloud security Cloud Standards Computation Models Confidential Computing cost of delay Cybersecurity Cyber Security Cybersecurity Policies EA Capability economic benefit effective project meetings Emerging Technologies FISMA global economic shifts Government Cloud Standards government data protection importance of meetings job duration leadership leadership styles Management Discipline memory encryption PMI prioritization program stakeholder engagement progress monitoring Project Management Project Management Discipline project management principles Project Manager rapidly changing world risk management SAFe Scaled Agile Framework stakeholder analysis stakeholder communication stakeholder management tips for project meetings TOGAF trusted execution environments US Federal Govt Weighted Shortest Job First WSJF
TheProjectManagement.Guru Logo

We help clients create long-term value for all stakeholders. Empowered by SMEs and experienced consultants, our services and solutions provide trust through assurance and help clients transform, grow and operate.

Dont miss out on new posts


    Don’t worry, we won’t spam you!

    © 2015 - 2023 TheProjectManagement.Guru | All rights reserved.

    Want to become a Coach/Mentor/Blogger?

    Join your hand with us for a better career and bright future. We can together conquer the world!

    write us now

    ×