What is Confidential Computing?

Confidential computing is a security technology that protects data while it is being processed – not only when it is stored or transmitted.

It allows organizations to run computations on sensitive or regulated information without exposing the underlying data or code by using hardware-based Trusted Execution Environments (TEEs), also known as secure enclaves.

Unlike traditional security models that protect data at rest and in transit, confidential computing extends protection to data in use. This means that sensitive information remains encrypted and isolated even while it is being analyzed, processed, or used to train AI models.

In simple terms:

Confidential computing keeps data encrypted while it is being processed (data in use), enabling secure collaboration, analytics, and AI on highly sensitive datasets – without compromising privacy or compliance.

It complements existing protections for data at rest and in transit, ensuring end-to-end security across the entire data lifecycle.

By protecting data in use from infrastructure-level exposure, confidential computing enables regulated organizations to adopt cloud-scale analytics and AI securely and confidently.

What is Confidential Computing?

Data at Rest

Protected storage of sensitive information using strong encryption, key management, and access controls.

Data in Transit

End-to-end encrypted data moving securely between systems, clouds, applications, or networks.

Data in Use

Protects data while the computation itself is running, such as during analytics, AI model training, or inference.

Why Confidential Computing Matters

Modern organizations – especially in regulated sectors like government, defense, healthcare, and finance – process extremely sensitive data that cannot be exposed, shared, or accessed by unauthorized parties.

However, in traditional computing models, data becomes visible to system memory during processing, even if it is encrypted at rest and in transit.

This creates critical risks:

  • Insider access from administrators or privileged users
  • Exposure to malware, memory scraping, or side-channel attacks
  • Cloud provider visibility into plaintext data
  • Compliance violations (HIPAA, GDPR, CJIS, FedRAMP, PCI)
  • Inability to use sensitive datasets for analytics or AI

Confidential computing eliminates this exposure by ensuring that data and code remain isolated inside a hardware-protected enclave while computations run.

In practice, this matters because it enables organizations to:

  • Process highly sensitive information securely in the cloud
  • Collaborate across institutions without sharing raw data
  • Train AI models on regulated datasets without violating privacy laws
  • Modernize legacy analytics workflows while preserving security and trust

As cyber threats evolve and AI adoption accelerates, confidential computing has become a foundational requirement for secure, privacy-preserving data processing.
What is Confidential Computing | Secure Data in Use

How Confidential Computing Works

Confidential computing relies on a Trusted Execution Environment (TEE), a secure enclave inside a processor where sensitive data can be processed safely.

The computation happens entirely within this protected space, keeping information secure from the operating system, cloud provider, and any unauthorized access.

The process works in five clear steps:

  • Code Verification
    The code that will run inside the TEE is checked through attestation, ensuring that only trusted and approved code is executed.
  • Environment Setup
    Once verified, the TEE is initialized and locked down, creating a secure area for processing.
  • Secure Processing
    Data sent into the TEE is decrypted only within the protected enclave, so it remains invisible outside.
  • Isolated Computation
    All computations happen entirely inside the TEE, with no external access.
  • Protected Output
    Results are encrypted before leaving the enclave, ensuring sensitive information stays secure.

What is Attestation?

Attestation proves that the TEE is genuine and running the expected code. Local attestation verifies enclaves on the same platform, while remote attestation allows external parties to confirm the integrity of the TEE, which is especially important for cloud deployments.

Why Use Confidential Computing?

Organizations adopt confidential computing to process sensitive, regulated, or proprietary data securely, while unlocking advanced analytics, AI, and collaborative opportunities.

By keeping data encrypted even while in use, confidential computing reduces risk, ensures compliance, and protects intellectual property.

Key reasons organizations implement confidential computing include:

Protect Sensitive Data in Use

Data remains secure throughout its lifecycle, including during active processing, preventing exposure to unauthorized users, insiders, or cloud operators.

Enable Collaborative Analytics

Multiple organizations can work together on analytics or AI tasks without sharing raw data, enabling innovation while maintaining full confidentiality.

Mitigate Insider and Infrastructure Risks

Even administrators, cloud staff, or malicious actors cannot access or manipulate information inside a TEE, reducing potential internal threats.

Ensure Regulatory Compliance

Supports adherence to strict frameworks such as GDPR, HIPAA, CJIS, and FedRAMP, lowering compliance risk when processing sensitive information.

Safely Leverage Public and Hybrid Clouds

Organizations can confidently run workloads on public or hybrid cloud infrastructure while maintaining control over encryption keys and data isolation.

Protect Intellectual Property

Beyond data, confidential computing secures proprietary algorithms, business logic, analytics models, and AI workflows, preserving competitive advantage.

Secure Edge and Hybrid Deployments

Workloads processed at the edge, closer to IoT devices or local servers, remain protected, enabling secure distributed computing and hybrid cloud strategies.

Who Provides Confidential Computing Capabilities?

Several major cloud providers and hardware vendors support confidential computing, offering secure environments for processing sensitive data:

Microsoft Azure Confidential Computing

Azure leverages Intel SGX and AMD SEV-SNP hardware to provide confidential computing options for both virtual machines and containerized workloads. Customers can run sensitive applications while keeping data encrypted in use.

AWS Nitro Enclaves

Amazon Web Services uses a virtualization-based TEE architecture to create isolated environments on EC2 instances. Nitro Enclaves enable secure key handling, cryptographic operations, and attestation.

Google Cloud Confidential Computing

Google provides confidential VMs built on AMD SEV technology, allowing organizations to protect data in use without major changes to their application code.

What Are the Considerations and Limitations of Confidential Computing?

Confidential computing provides strong privacy protections, but there are a few trade-offs.

Deployments may require attestation and key management, and some TEEs only support specially written code. Availability can also vary across cloud regions.

Despite these factors, confidential computing remains a valuable solution for secure data collaboration and privacy-focused workloads.

What Are the Common Use Cases of Confidential Computing?

Confidential computing enables secure processing of sensitive data across industries. Common use cases include:

Healthcare Collaborations
Hospitals and research institutions can analyze patient data or run joint studies without exposing sensitive health information.

Financial Services
Banks, insurers, and financial institutions can share insights or train models on customer data without revealing raw records.

Supply Chain and Manufacturing
Vendors can analyze operational performance or production data while keeping proprietary information confidential.

AI and Model Evaluations
Data owners can test AI models on their own datasets without downloading, sharing, or reverse-engineering sensitive data or models.

All these use cases rely on TEEs, ensuring computations occur in a protected enclave so data and models remain secure and confidential.

How Does Duality Enable Confidential Computing?

Duality uses Trusted Execution Environments (TEEs) as part of a platform designed for secure data collaboration and privacy-preserving AI.

TEEs work alongside other Privacy-Enhancing Technologies (PETs), including fully homomorphic encryption (FHE), federated learning (FL), and differential privacy (DP).

With Duality, organizations can work on sensitive or regulated data without exposing it to collaborators or infrastructure providers.

Common applications include:

  • Running AI or ML models on private datasets while keeping the underlying data protected
  • Evaluating proprietary models while keeping model architecture and weights hidden
  • Performing joint analytics across institutions without moving or centralizing data
  • Protecting intermediate results during federated learning processes

For example, a pharmaceutical company can run drug trials across multiple hospitals, or a bank can detect fraud patterns across institutions, all without sharing raw data.

Duality is integrated with AWS Nitro Enclaves and Google Cloud Confidential Computing (Confidential VMs), enabling secure execution of analytics and AI workloads inside hardware-based TEEs.

We also handle tasks like attestation, key management, and policy enforcement, allowing users to focus on analysis and insights.

Take the Next Step with Duality

Duality enables organizations to use confidential computing to process sensitive data securely.

Our platform combines Trusted Execution Environments (TEEs) with other Privacy-Enhancing Technologies (PETs) and manages key tasks like attestation, key management, and policy enforcement.

This allows teams to focus on insights, analysis, and collaboration without exposing sensitive information or risking non-compliance.

Get started today by contacting our team or requesting a demo to see how Duality can help your organization work with sensitive data safely and efficiently.