GCP Confidential Computing On AWS and GCP you might use something like KMS to encrypt your AMI or disk images, however that only protects them when they are sitting in storage. When your application is running all that super sensitive memory is in the clear. GCP uses AMD SEV to give you ...
One of the solutions to this challenge lies in the use of confidential computing. In the existing security model, we already have ways to implement security controls for data in transit (e.g. https, TLS, etc.) and when the data is at rest (e.g. encrypted disks). Confidential computin...
Using secret computing and confidential VMs, the Constellation Kubernetes engine isolates Kubernetes clusters from the rest of the
“Google Cloud encrypts data at-rest and in-transit, but customer data must be decrypted for processing,” write Nelly Porter, Senior Product Manager; Gilad Golan, Engineering Director, Confidential Computing; and Sam Lugani, Lead Security PMM, G Suite & GCP platform. “Confidential Computing is...
All these technical security details are hidden. Google claims its goal is to: "Make Confidential Computing easy. The transition to Confidential VMs is seamless -- all GCP workloads you run in VMs today can run as a Confidential VM. One checkbox -- it's that simple." ...