- Development Against Standard Enclaving Abstractions
Use the Open Enclave SDK to build applications that protect against different types of
enclave with a consistent API surface that surrounds an enclaving abstraction and
provides support for portability and flexibility in architecture.
- Verify TEE Identities
Along with validating the code inside them to determine whether secrets can be released
or not. Verification is very easy and available using attestation services.
- Harden Enclave Code With Microsoft Research Insights
Explore the research released on new confidential computing apps, techniques for
hardening TEE apps and tips on how to stop information from leaking out of the TEE.
Application Patterns of Confidential Computing
- Protect the integrity and confidentiality of data using, for example, SQL Server
Always Encrypted technology - Create trusted networks using, for example, Confidential Consortium Blockchain
Framework. - Combine multiple sources of data using, for example, secure multiparty machine
learning - Protect sensitive IP code using, for example, secured content licensing and DRM
protection.