Category: Software, Data, Kubernetes, firewall, encryption

Google is hoping to make confidential computing — the encryption of data in-use — as easy as the click of a button for cloud native users. One of the really neat things about this is how simple [confidential computing] is to actually implement.

When you click that button and deploy Confidential GKE Nodes, the system will automatically enforce the use of Confidential VMs for all your worker nodes, which ensures that your data is encrypted in memory with a dedicated key generated and managed by the AMD EPYC processor.

We have the ability to do it in hardware, and we have the opportunity to offer a secure solution and create this cryptographic isolation for those VMs that we call confidential,” said Porter.

Everything that they can run in VMs they can run in confidential VMs and it also ensures that performance or this particular task would not be significantly impacted.”

Related Articles