Which statement accurately describes the key features and benefits of OCI Confidential Computing?
Which statement accurately describes the key features and benefits of OCI Confidential Computing?
OCI Confidential Computing encrypts and isolates in-use data and the applications processing that data, thereby preventing unauthorized access or modification. This feature leverages hardware-based Trusted Execution Environments (TEEs) to provide security for data while it is actively being processed, ensuring data protection not only at rest and in transit, but also during use.
It encrypts and isolates in-use data and the applications processing that data, thereby preventing unauthorized access or modification is an accurate description of the key features and benefits of OCI Confidential Computing. Confidential Computing is a feature that leverages hardware-based Trusted Execution Environments (TEEs) to protect data and applications from unauthorized access or modification while they are in use by the CPU or memory. This adds an extra layer of security to cloud computing, as it protects data not only at rest and in transit, but also in use. The other options are not accurate descriptions of the key features and benefits of OCI Confidential Computing. Reference: [Confidential Computing]
https://docs.oracle.com/en-us/iaas/Content/Compute/References/confidential_compute.htm