Enhance your privacy posture without code changes with Azure confidential computing
As regulated industries embrace the cloud, they seek higher levels of protection for their most sensitive workloads. Microsoft spends billions of dollars per year on cybersecurity, much of that goes to make Microsoft Azure a trusted cloud platform. With our investments in Azure confidential computing – we’re extending data protections from “at-rest” and “in-transit”, to now while its “in-use”.
In our first episode, we showcased new default memory protections and demonstrated confidential computing with Application-Level Enclaves. Join us for the second episode in the series – as Jeremy Chapman and Michael McReynolds discuss new options to achieve confidentiality without code changes.
Here are the highlights from our second episode.
Broadening the Spectrum of Offerings. Azure continues to grow its comprehensive set of confidential computing offerings. This year, we took major steps to broaden the technologies we offer to meet the needs of customers. We see these technologies on a spectrum, each suited to the uniqueness of the workload. Whether you want to “lift and shift” on-prem virtual machines into confidential computing, or you want to build a confidential cloud-native solution with containers, or you want to achieve the using application-enclaves - we have solutions for all.
Secure Encrypted Virtualization – Secure Nested Paging. SEV-SNP is new functionality from AMD, first introduced with the 3rd Generation EPYC processors. SEV-SNP adds new hardware-based protections such as memory encryption with integrity protection to help prevent malicious hypervisor-based attacks. It offers stronger protection around interrupt behavior, as well as helping protect against memory and data corruption attacks.
Confidential Virtual Machines. Earlier this year, we reached the general availability on confidential VMs. They are designed to provide organizations with an easy button to confidentiality, enabling more sensitive workloads to migrate with no code changes and minimal performance overheads. For organizations seeking control over VM firmware, check out the preview of this functionality. By leveraging AMD SEV-SNP, these VMs have hardened guest protections from the hypervisor and other host management codes, enabling organizations to minimize the attack surface and further reduce trust in the cloud provider.
Confidential Computing Attestation. A core tenet of confidential computing is attestation. This process enables organizations to remotely “attest” the validity of the infrastructure they are deploying applications and secrets into. Today, we reached a major milestone with confidential VMs by enabling guest attestation functionality which we’ve open sourced. By using this, organizations can cryptographically verify the authenticity of the platform is what they expect it to be.
Confidential VM Node Pools. Building on top of the innovation in VMs, we released confidential VM node pools on Azure Kubernetes Service (AKS), and today we are announcing it is now generally available. AKS inherits the memory encryption from the AMD SEV-SNP hardware and extends it directly to the containers. This helps protect sensitive containerized applications from memory attacks and cross-tenant lateral attacks.
Confidential Containers on Azure Container Instances (ACI). Finally, we released an industry first serverless offering in limited preview. This offering enables you to bring your existing Linux containers, running them within an AMD SEV-SNP environment. ACI works by extending the memory encryption protections directly to your container group level, providing an even tighter trust boundary and with less code.
Please enjoy the show, and as always - we want to hear from you! If you have any questions, suggestions, or product improvements you’d like us to make, please comment and we will address them.
Learn More
- Learn about Azure confidential computing
- DCasv5 and ECasv5 are now generally available
- Documentation for General Purpose Confidential Virtual Machines
- Documentation for Memory Optimized Confidential Virtual Machines
Additional Resources
- To learn about the threat model visit aka.ms/cvmthreatmodel
Published on:
Learn moreRelated posts
What’s new with Azure Repos?
We thought it was a good time to check in and highlight some of the work happening in Azure Repos. In this post, we’ve covered several recent ...
Part 1: Building Your First Serverless HTTP API on Azure with Azure Functions & FastAPI
Introduction This post is Part 1 of the series Serverless Application Development with Azure Functions and Azure Cosmos DB, where we explore ...
Announcing GPT 5.2 Availability in Azure for U.S. Government Secret and Top Secret Clouds
Today, we are excited to announce that GPT-5.2, Azure OpenAI’s newest frontier reasoning model, is available in Microsoft Azure for U.S. Gover...
Sync data from Dynamics 365 Finance & Operations Azure SQL Database (Tier2) to local SQL Server (AxDB)
A new utility to synchronize data from D365FO cloud environments to local AxDB, featuring incremental sync and smart strategies.
Azure Cosmos DB Conf 2026 — Call for Proposals Is Now Open
Every production system has a story behind it. The scaling limit you didn’t expect. The data model that finally clicked. The tradeoff you had ...