{"id":853844,"date":"2024-03-05T12:22:00","date_gmt":"2024-03-05T12:22:00","guid":{"rendered":"https:\/\/www.capgemini.com\/be-en\/?p=853844&#038;preview=true&#038;preview_id=853844"},"modified":"2025-04-02T04:28:44","modified_gmt":"2025-04-02T04:28:44","slug":"staying-secure-and-sovereign-in-the-cloud-with-confidential-computing","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","title":{"rendered":"Staying secure and sovereign in the cloud with confidential computing"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Staying secure and sovereign in the cloud with confidential computing<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/02\/1516312072067.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Stefan Zosel<\/h5><h5 class=\"blog-date\">Mar 5, 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">A new collaboration between Capgemini and Edgeless Systems will enable public sector organizations to keep sensitive data safe during processing. In doing so, it will remove the remaining barrier to adopting the cloud.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Ask a public sector CIO in Europe why they have yet to adopt the cloud and the chances that data privacy, security, and compliance with GDPR will rank among their top concerns.<\/p>\n\n\n\n<p>This stems from the fact that cloud infrastructure lives in third-party data centers \u2013&nbsp;often in Asia or the US \u2013 that are shared with other users and operated by unknown parties. Which potentially means trusting a lot of people with your sensitive data.&nbsp;<\/p>\n\n\n\n<p>For years, encryption has been the de facto solution to this problem. This approach sees cloud providers convert plaintext data into ciphertext to protect data in storage and in transit. And because only the user has the key, not even your cloud provider can access your data.<\/p>\n\n\n\n<p>Sovereign cloud solutions offer further peace of mind by giving users an appropriate level of control over their data, technology and operations. All in a dedicated environment within their nation, region or jurisdiction, and complying with its laws.<\/p>\n\n\n\n<p>But what happens when you need to process or analyze that data?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keeping-your-data-encrypted-at-all-times\"><strong>Keeping your data encrypted at all times<\/strong><\/h2>\n\n\n\n<p>To do this, you need to move your data to main computer memory and make it plaintext, so the CPU can process it. But that means anyone with access to that machine (wherever it is in the world) could make a copy of the memory or attack it \u2013 comprising your data on every level.<\/p>\n\n\n\n<p>Confidential computing closes this remaining security gap. Put simply, it combines hardware (new CPU functions) with specially adapted software to protect data during use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/03\/TEE_Diagram-recreation.png?w=960\" alt=\"\" class=\"wp-image-996691\"\/><\/figure>\n\n\n\n<p>First, a secure physical environment within the CPU, called a Trusted Execution Environment (TEE), isolates data during processing, analysis, and runtime. You could think of it as a kind of black box.<\/p>\n\n\n\n<p>Only defined interfaces are authorized to transfer encrypted data in and out of this black box. The box then converts that data into plaintext for processing and re-encrypts it before sending it back.<\/p>\n\n\n\n<p>Second, encryption key management software guarantees that no one can access the data inside the black box. Effectively, this means that data is always encrypted: at rest, in transit and in use. Even if attackers have managed to gain physical access to a server in a data center.&nbsp;<\/p>\n\n\n\n<p>In fact, from a legal point of view, confidential computing is considered so safe that the data it protects could be classed as anonymized. And if data is anonymous, it doesn\u2019t matter where it is, or whether it\u2019s processed alongside other sensitive data.<\/p>\n\n\n\n<p>For example, you could analyze finance and health data together to identify fraud or abuse \u2013&nbsp;without either party ever viewing the other party\u2019s data. You could even use artificial intelligence to crunch larger data sets inside the black box. (Though this would need to take within a GPU, rather than a CPU.)<\/p>\n\n\n\n<p>Finally, confidential computing offers another crucial feature: \u201cremote attestation\u201d. This means the CPU issues a cryptographic certificate to prove the confidentiality, integrity, and authenticity of the black box. This certificate can, and should be, checked on the user side before sensitive data is transferred to the TEE.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-so-why-aren-t-all-public-sector-organizations-using-confidential-computing\"><strong>So, why aren\u2019t all public sector organizations using confidential computing?<\/strong><\/h2>\n\n\n\n<p>If this sounds like a new concept, it isn\u2019t. Confidential computing has been around for over a decade. And almost all current server hardware and cloud providers support it.<\/p>\n\n\n\n<p>In theory, then, many public sector organizations should be moving sensitive workloads to the cloud, confident that their data is locked down at every stage. Yet only a few are taking advantage of this functionality. Why?<\/p>\n\n\n\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>It\u2019s complex, and needs configuring differently depending on the cloud provider you use. And it\u2019s hard to build the specialist expertise needed to implement it yourself.<\/li>\n\n\n\n<li>Confidential computing is mainly available for smaller, modern workloads, such as those running on \u201ccontainers\u201d. It wouldn\u2019t be possible to lift and shift a large legacy workload to the cloud and apply confidential computing to it.<\/li>\n<\/ol>\n\n\n\n<p>To benefit from confidential computing, then, you need to understand where it\u2019s really needed and applicable \u2013 and make it simple to use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-partnering-to-make-security-in-the-cloud-easy-for-public-sector-organizations\"><strong>Partnering to make security in the cloud easy for public sector organizations<\/strong><\/h2>\n\n\n\n<p>At Capgemini, we recognize that this need will only grow as cloud technologies become more prevalent. So, we\u2019ve partnered with the German start-up, Edgeless Systems, to give clients in Europe access to leading open-source software for confidential computing.<\/p>\n\n\n\n<p>Edgeless Systems\u2019 solutions support all confidential computing CPUs and numerous cloud providers, from US-based hyperscalers to smaller, European players. They also take data protection to the next level by offering end-to-end solutions. That means they shield your network, key management and storage from access by your cloud provider\u2019s people or infrastructure \u2013 not only your containers.<\/p>\n\n\n\n<p>In other words, our partnership with Edgeless will make security in the cloud easy for public sector organizations. Even when they deal with highly protected personal data.<\/p>\n\n\n\n<p>For example, software from Edgeless Systems provides the confidential computing foundation for Germany\u2019s electronic patient record (ePA) system. This system enables highly sensitive data to be shared between patients, doctors, hospitals and research institutions. All in line with GDPR, the German Federal Data Protection Act&nbsp;and requirements set by the National Agency for Digital Medicine (Gematik).<\/p>\n\n\n\n<p>It\u2019s a great example of how confidential computing can help to digitize and modernize critical areas of public administration.<\/p>\n\n\n\n<p>If it can protect the most protected health data, what could it do for you?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.edgeless.systems\/\"><strong>Find out more about Edgeless Systems<\/strong><\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Authors<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2022\/07\/1516312072067.png\" alt=\"Stefan Zosel\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/stefan-zosel-4567461\/?originalSubdomain=de\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Stefan Zosel<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Capgemini Government Cloud Transformation Leader<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/stefan-zosel-4567461\/?originalSubdomain=de\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">\u201cSovereign cloud is a key driver for digitization in the public sector and unlocks new possibilities in data-driven government. It offers a way to combine European values and laws with cloud innovation, enabling governments to provide modern and digital services to citizens. As public agencies gather more and more data, the sovereign cloud is the place to build services on top of that data and integrate with Gaia-X services.\u201d<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":264,"featured_media":853845,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"_eb_attr":"","cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"7298e3ea-2fef-4944-9276-cb934f184b19\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[101],"partners":[],"blog-topic":[121],"content-group":[],"class_list":["post-853844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","industry-public-sector","blog-topic-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium<\/title>\n<meta name=\"description\" content=\"Discover how to maintain your security and sovereignty while embracing the cloud with confidential computing. Delve deeper into our blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium\" \/>\n<meta property=\"og:description\" content=\"Staying secure and sovereign in the cloud with confidential computingStefan ZoselMar 5, 2024 FacebookLinkedinA new collaboration between Capgemini and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Belgium\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T12:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T04:28:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefan Zosel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rashmiadarshshetty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\",\"url\":\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\",\"name\":\"Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/be-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg\",\"datePublished\":\"2024-03-05T12:22:00+00:00\",\"dateModified\":\"2025-04-02T04:28:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51\"},\"description\":\"Discover how to maintain your security and sovereignty while embracing the cloud with confidential computing. Delve deeper into our blog\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg\",\"width\":1217,\"height\":761},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/be-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/be-en\/\",\"name\":\"Capgemini Belgium\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/be-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51\",\"name\":\"rashmiadarshshetty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g\",\"caption\":\"rashmiadarshshetty\"},\"url\":\"https:\/\/www.capgemini.com\/be-en\/author\/rashmiadarshshetty\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium","description":"Discover how to maintain your security and sovereignty while embracing the cloud with confidential computing. Delve deeper into our blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","og_locale":"en_US","og_type":"article","og_title":"Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium","og_description":"Staying secure and sovereign in the cloud with confidential computingStefan ZoselMar 5, 2024 FacebookLinkedinA new collaboration between Capgemini and","og_url":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","og_site_name":"Capgemini Belgium","article_published_time":"2024-03-05T12:22:00+00:00","article_modified_time":"2025-04-02T04:28:44+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Stefan Zosel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rashmiadarshshetty","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","url":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","name":"Staying secure and sovereign in the cloud with confidential computing - Capgemini Belgium","isPartOf":{"@id":"https:\/\/www.capgemini.com\/be-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","datePublished":"2024-03-05T12:22:00+00:00","dateModified":"2025-04-02T04:28:44+00:00","author":{"@id":"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51"},"description":"Discover how to maintain your security and sovereignty while embracing the cloud with confidential computing. Delve deeper into our blog","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/#primaryimage","url":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","contentUrl":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","width":1217,"height":761},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/be-en\/#website","url":"https:\/\/www.capgemini.com\/be-en\/","name":"Capgemini Belgium","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/be-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/042f09e0cfa2a52587f0a9970014bb51","name":"rashmiadarshshetty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/be-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f6eaed744e43d2a7bdfc18084629fd7f1b880b767ec288ec858672db64519dd?s=96&d=mm&r=g","caption":"rashmiadarshshetty"},"url":"https:\/\/www.capgemini.com\/be-en\/author\/rashmiadarshshetty\/"}]}},"blog_topic_info":[{"id":121,"name":"Cloud"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"industry":[{"id":101,"name":"Public sector","slug":"public-sector"}],"blog-topic":[{"id":121,"name":"Cloud","slug":"cloud"}],"following_users":[{"id":422,"name":"automator","slug":"automator"},{"id":576,"name":"jaydeepsinghrawat","slug":"jaydeepsinghrawat"},{"id":485,"name":"rashmiadarshshetty","slug":"rashmiadarshshetty"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Staying secure and sovereign in the cloud with confidential computing","url":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Belgium","logo":""},"keywords":[],"dateCreated":"2024-03-05T12:22:00Z","datePublished":"2024-03-05T12:22:00Z","dateModified":"2025-04-02T04:28:44Z"},"rendered":"<meta name=\"parsely-title\" content=\"Staying secure and sovereign in the cloud with confidential computing\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/be-en\/insights\/expert-perspectives\/staying-secure-and-sovereign-in-the-cloud-with-confidential-computing\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-03-05T12:22:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Belgium","distributor_original_site_url":"https:\/\/www.capgemini.com\/be-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/be-en\/wp-content\/uploads\/sites\/14\/2024\/04\/9352d151-3069-439c-a343-c08ac14b07a3.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/12\/cg-logo-blue.svg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/posts\/853844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/comments?post=853844"}],"version-history":[{"count":2,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/posts\/853844\/revisions"}],"predecessor-version":[{"id":873567,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/posts\/853844\/revisions\/873567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/media\/853845"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/media?parent=853844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/categories?post=853844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/tags?post=853844"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/brand?post=853844"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/service?post=853844"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/industry?post=853844"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/partners?post=853844"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/blog-topic?post=853844"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/be-en\/wp-json\/wp\/v2\/content-group?post=853844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}