AWS confidential computing is always on. There is no mechanism for any AWS operator to access customers' Amazon Elastic Compute Cloud (Amazon EC2) instances within the AWS Nitro System.","id":"collection-text-media#aws-confidential-compute-overview","heading":"Protecting data in use"},"metadata":{"tags":[]}}]},"metadata":{"auth":{},"pagination":{"empty":false,"present":true},"testAttributes":{}},"context":{"page":{"locale":null,"site":null,"pageUrl":"https://aws.amazon.com/confidential-computing/","targetName":null,"pageSlotId":null,"organizationId":null,"availableLocales":null},"environment":{"stage":"prod","region":"us-east-1"},"sdkVersion":"1.0.117"},"refMap":{"manifest.js":"47864e0370","rt-text-media-collection.rtl.css":"38310b08f6","rt-text-media-collection.css.js":"35f162f975","rt-text-media-collection.css":"ed7cf9b245","rt-text-media-collection.js":"f286311cb5","rt-text-media-collection.rtl.css.js":"61190f0adc"},"settings":{"templateMappings":{"hyperlinkText":"hyperlinkText","hyperlinkUrl":"hyperlinkUrl","heading":"heading","mediaAltText":"mediaAltText","mediaPosition":"mediaPosition","mediaUrl":"mediaUrl","subheader":"subheader","bodyContent":"bodyContent","videoOverlayTitle":"videoOverlayTitle","videoThumbnailUrl":"videoThumbnailUrl","videoPlayButtonText":"videoPlayButtonText","dark":"dark"}}}
Protecting data in use
AWS confidential computing is always on. There is no mechanism for any AWS operator to access customers' Amazon Elastic Compute Cloud (Amazon EC2) instances within the AWS Nitro System.
The Nitro System is built from the ground up, with no mechanism for operators to access customer content. The Nitro System consists of specialized components like AWS Nitro Cards, the AWS Nitro Security Chip, and the AWS Nitro Hypervisor."},"metadata":{"tags":[]}},{"fields":{"useCaseTitle":"No code changes","id":"product-use-cases#benefit-2-aws-confidential-compute","customSortOrder":"2","useCaseSummary":"
The confidential computing protection for the Nitro System is inherent to any Nitro-based Amazon EC2 instance. Customers do not need to modify their code to get this protection."},"metadata":{"tags":[]}},{"fields":{"useCaseTitle":"Cryptographic attestation","id":"product-use-cases#benefit-3-aws-confidential-compute","customSortOrder":"3","useCaseSummary":"
AWS NitroTPM and AWS Nitro Enclaves allow customers to attest to system state, securely generate and manage cryptographic keys, and prove platform identity."},"metadata":{"tags":[]}},{"fields":{"useCaseTitle":"Transparency and assurance","id":"product-use-cases#benefit-4-aws-confidential-compute","customSortOrder":"4","useCaseSummary":"
The Nitro System controls that prevent operator access are part of the AWS Service Terms, and the Nitro System has received independent affirmation of its confidential computing capabilities."},"metadata":{"tags":[]}},{"fields":{"patternHeading":"Benefits","id":"product-use-cases#overview-benefit-aws-confidential-compute"},"metadata":{"tags":[{"id":"GLOBAL#pattern#pattern-data","name":"pattern-data","namespaceId":"GLOBAL#pattern","description":"pattern-data","metadata":{}}]}}]},"metadata":{"auth":{},"pagination":{"empty":false,"present":true},"testAttributes":{}},"context":{"page":{"locale":null,"site":null,"pageUrl":"https://aws.amazon.com/confidential-computing/","targetName":null,"pageSlotId":null,"organizationId":null,"availableLocales":null},"environment":{"stage":"prod","region":"us-east-1"},"sdkVersion":"1.0.117"},"refMap":{"manifest.js":"3daf852ae2","rt-qa-sampler.rtl.css":"49ffbf5e67","rt-qa-sampler.css":"ba3dc4de37","rt-qa-sampler.js":"c82b7d838e","rt-qa-sampler.css.js":"339cdf2b22","rt-qa-sampler.rtl.css.js":"30ca2422c8"},"settings":{"templateMappings":{"patternHeading":"patternHeading","patternSubheading":"patternSubheading","topic":"useCaseTitle","content":"useCaseSummary"}}}
Benefits
Confidential computing capabilities
Supporting the most demanding use cases
Nitro System
Provides confidentiality and isolation from AWS operators.
Nitro Enclaves
Allows customers to create isolated compute environments to protect highly sensitive data from their own users and applications.
NitroTPM
Allows customers to attest to the integrity of their instances by providing cryptographic proof.
Memory encryption
Starting with AWS Graviton2, AMD EPYC (Milan), and Intel Xeon Scalable (Ice Lake) processors, instance memory is always encrypted. Instances that are enabled with AMD SEV-SNP use an instance-specific key for their memory encryption.