The 2-Minute Rule for Data confidentiality
Google Cloud encrypts data at-rest As well as in-transit, but shopper data must be decrypted for processing. Confidential Computing is usually a breakthrough know-how which encrypts data in-use—even though it is being processed. An case in point use scenario for confidential computing: a client while in the healthcare industry wishes to use a pr