Confidential Computing overview

Confidential Computing is the protection of data in-use using a hardware-based Trusted Execution Environment (TEE). TEEs are secure and isolated environments that prevent unauthorized access or modification of applications and data while they are in use. This security standard is defined by the Confidential Computing Consortium.

End-to-end encryption

End-to-end encryption involves three states:

  • Encryption at rest protects your data while it is being stored.

  • Encryption in transit protects your data when it is moving between two points.

  • Encryption in use protects your data while it is being processed.

Confidential Computing provides the last piece of end-to-end encryption: encryption in use.

Confidential Computing services

Google Cloud offers the following Confidential Computing products:

Confidential VM is also available for use in the following products:

What's next

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025年10月29日 UTC.