-
Notifications
You must be signed in to change notification settings - Fork 21.9k
Update virtual-machines-overview.md #127823
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -74,7 +74,7 @@ Learn more: | |||||
|
|
||||||
| [!INCLUDE [Azure Disk Encryption retirement notice](~/reusable-content/ce-skilling/azure/includes/security/azure-disk-encryption-retirement.md)] | ||||||
|
|
||||||
| Azure Disk Encryption is a new capability for encrypting your Windows and Linux virtual machine disks. Azure Disk Encryption uses the industry-standard [BitLocker](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)) feature of Windows and the [dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt) feature of Linux to provide volume encryption for the OS and the data disks. | ||||||
| Azure Disk Encryption is a capability for encrypting your Windows and Linux virtual machine disks. Azure Disk Encryption uses the industry-standard [BitLocker](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)) feature of Windows and the [dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt) feature of Linux to provide volume encryption for the OS and the data disks. | ||||||
|
|
||||||
| The solution is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets in your key vault subscription. It ensures that all data in the virtual machine disks are encrypted at rest in Azure Storage. | ||||||
|
|
||||||
|
|
@@ -148,11 +148,9 @@ Learn more: | |||||
|
|
||||||
| ## Confidential Computing | ||||||
|
|
||||||
| While confidential computing is not technically part of virtual machine security, the topic of virtual machine security belongs to the higher-level subject of "compute" security. Confidential computing belongs within the category of "compute" security. | ||||||
| Confidential computing ensures that when data is protected against tampering and exfiltration even when it is resident in memory for processing. The data in memory is protected inside a Trusted Execution Environment https://en.wikipedia.org/wiki/Trusted_execution_environment (TEE - also known as an enclave), an example of which is shown in the figure below. | ||||||
|
||||||
| Confidential computing ensures that when data is protected against tampering and exfiltration even when it is resident in memory for processing. The data in memory is protected inside a Trusted Execution Environment https://en.wikipedia.org/wiki/Trusted_execution_environment (TEE - also known as an enclave), an example of which is shown in the figure below. | |
| Confidential computing ensures that when data is protected against tampering and exfiltration even when it is resident in memory for processing. The data in memory is protected inside a [Trusted Execution Environment](https://en.wikipedia.org/wiki/Trusted_execution_environment) (TEE - also known as an enclave), an example of which is shown in the figure below. |
Copilot
AI
Nov 3, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Grammatical issue: 'denied and the environment disabled' should be 'denied and the environment can be disabled' or 'denied, and the environment is disabled' for parallel structure with 'detected'.
| TEEs help to ensure there is no way to view data or alter the operations inside a TEE from the outside, even by an Azure operator with a debugger. They even ensure that only authorized code is permitted to access data. If the code is altered, the operations can be detected and denied and the environment disabled. The TEE enforces these protections throughout the execution of code within it. | |
| TEEs help to ensure there is no way to view data or alter the operations inside a TEE from the outside, even by an Azure operator with a debugger. They even ensure that only authorized code is permitted to access data. If the code is altered, the operations can be detected and denied, and the environment can be disabled. The TEE enforces these protections throughout the execution of code within it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Missing 'is' after 'data' - should read 'when data is protected' for grammatical correctness.