Skip to main content

Compliance

Compliance can be a great obstacle for companies trying to shift to the public cloud, to leverage the scalability and cost-efficiency of such infrastructure. Ensuring the integrity of workloads becomes a crucial concern. Specific regulations, including GDPR, DORA, and HIPAA, necessitate robust data protection measures. Confidential computing addresses GDPR's "privacy by design" and "data minimization" requirements, aiding compliance and solving the challenges posed by moving data following the Cloud Act. DORA, effective from 2025, explicitly mandates "encryption in use" in its Article 9.2. Confidential computing is the only technology that efficiently handles this with minimal performance impact. Visit our landing page on DORA to learn more. In the context of HIPAA, while data protection during rest and transit is well-established, confidential computing ensures the safeguarding of electronic-protected health information (ePHI) during processing, thus fulfilling crucial compliance aspects.