Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

Confidential Computing Working Group Charter 2024
Confidential Computing Working Group Charter 2024

Confidential Computing Working Group Charter 2024

Release Date: 09/10/2024

The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This group's scope encompasses developing and promoting standards and best practices for the deployment and management of Trusted Execution Environments (TEEs). These environments are pivotal for ensuring that sensitive data remains protected from tampering and disclosure, not only when stored or in transit but also while being processed. The group's responsibilities include identifying applications and sectors—such as healthcare, finance, government, SaaS, and ISV—where the privacy and security of data during processing are extremely important. The group will address challenges associated with deploying Confidential Computing in cloud-based environments, recognizing the unique threats posed by shared computing resources and potential internal threats (e.g., operators, insiders, root users, attackers). By focusing on safeguarding data in use, the working group aims to close a critical gap in data security, fostering greater trust in digital systems and paving the way for wider adoption of Confidential Computing as a core component of digital security infrastructures.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Navigating Cloud Security: A Shared Responsibility
Navigating Cloud Security: A Shared Responsibility
Published: 10/17/2024
Rowing the Same Direction: 6 Tips for Stronger IT and Security Collaboration
Rowing the Same Direction: 6 Tips for Stronger IT and Security Coll...
Published: 10/16/2024
Unleashing the Power of Managed Endpoint Security: Crafting Effective SD-WAN and SASE Strategies
Unleashing the Power of Managed Endpoint Security: Crafting Effecti...
Published: 10/15/2024
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Published: 10/08/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training