From b037c13a2286f730398541beed8339041c64d372 Mon Sep 17 00:00:00 2001 From: Sal Kimmich <7944142+Salkimmich@users.noreply.github.com> Date: Wed, 26 Jun 2024 08:48:31 +0100 Subject: [PATCH] Update term_specification_matrix.md --- term_specification_matrix.md | 1 + 1 file changed, 1 insertion(+) diff --git a/term_specification_matrix.md b/term_specification_matrix.md index a78d6b1..4460298 100644 --- a/term_specification_matrix.md +++ b/term_specification_matrix.md @@ -7,6 +7,7 @@ This matrix provides an overview of key terms related to Confidential Computing, | Term | Definition (Summarized) | Linked Resources | Underspecified? | |---------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------| | **Confidential Computing** | The protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment. | [CCC](https://confidentialcomputing.io) | No | +| **Confidential Payload** | A set of code and data specifically designed to be executed within Trusted Execution Environments (TEEs) while maintaining strict confidentiality and integrity. | | No | | **Workload Identity** | Unique identity assigned to software workloads for authentication and access management across services and resources. | [Microsoft Learn](https://learn.microsoft.com/en-us/entra/workload-id/workload-identities-overview), | Yes, different usages across cloud providers (Microsoft, AWS, Google Cloud). | | **Remote Attestation** | A process whereby a system produces information about itself (typically cryptographically-backed) and another party verifies that information, allowing decisions to be made about what types of trust relationships are appropriate to the first system. | [IETF RFC 9334](https://datatracker.ietf.org/doc/html/rfc9334), [CCC Blog](https://confidentialcomputing.io/2023/04/06/why-is-attestation-required-for-confidential-computing/) | No | | **Enclave** | CCC does not currently support this definition as it's not industry wide. | | No |