At Google Cloud's virtual Cloud Next '20 event, Google announced its newest cloud security program: Confidential VMs (virtual machines). The idea is simple: As we put more and more of our work and data on the cloud, we need data not just to be encrypted at-rest and in-transit but to be encrypted in memory while being processed. The results in the public cloud market may be profound.
Encrypting data in and out of memory, as you might imagine, takes a lot of CPU power. Without sufficient processing power, encrypting and decrypting data in and out of memory would be prohibitively slow. To pull this off, Confidential VMs rely on second-generation AMD difference between computer science and computer engineering processors.
These chips were designed to be fast enough to loosen Intel's heretofore iron grip on data center processors. AMD has pulled this off. In addition to being the foundation of Google's secure Confidential VMs, Oracle's new Cloud E3 platform and AWS's Elastic Compute Cloud (EC2) C5a instances are both on top of the second-generation AMD EPYC CPUs.
Encrypting data in and out of memory, as you might imagine, takes a lot of CPU power. Without sufficient processing power, encrypting and decrypting data in and out of memory would be prohibitively slow. To pull this off, Confidential VMs rely on second-generation AMD difference between computer science and computer engineering processors.
These chips were designed to be fast enough to loosen Intel's heretofore iron grip on data center processors. AMD has pulled this off. In addition to being the foundation of Google's secure Confidential VMs, Oracle's new Cloud E3 platform and AWS's Elastic Compute Cloud (EC2) C5a instances are both on top of the second-generation AMD EPYC CPUs.
No comments:
Post a Comment