Confidential Computing

Improve isolation of sensitive data payloads with hardware-based memory protections