User's Guide: Concepts

1.0 Introduction

Fortanix Confidential Computing Manager is a cutting-edge solution designed to address the challenges of handling confidential data securely. It serves as a secure and controlled environment for Confidential Computing Manager, ensuring the seamless handling, processing, and transmission of sensitive information. Fortanix Confidential Computing Manager provides a protected ecosystem where users can collaborate on sensitive data without compromising security. By implementing advanced encryption, access controls and utilizing confidential computing technology.

2.0 Definitions

This section defines key components within Fortanix Confidential Computing Manager with its functionalities and significance.

2.1 Inbound Connector

The Inbound Connector serves the purpose of importing input data from external sources during runtime, thereby facilitating Computing Manager within the Fortanix Confidential Computing Manager environment. For efficient Computing Manager, a seamless mechanism is essential to bring external data securely into the Fortanix Confidential Computing Manager environment. Users have the capability to configure Inbound Connectors to bring in data, ensuring secure and controlled access during runtime.

In addition to facilitating the import of external data during runtime, Inbound Connectors within Fortanix CCM now offers an enhanced shared functionality. This feature enables seamless collaboration between groups from different CCM accounts by allowing them to securely share Inbound Connectors.

2.2 Outbound Connector

The Outbound Connector plays a crucial role in securely transmitting processed data from Fortanix Confidential Computing Manager to external destinations. This data connector contributes to maintaining the data integrity by ensuring controlled and protected data sharing. Within the Outbound Connector, users can define secure transmission parameters, providing a customizable approach to data transmission.

In addition to facilitating the exporting the data in a CSV file, Outbound Connectors within Fortanix CCM now offers an enhanced shared functionality. This feature enables seamless collaboration between groups from different CCM accounts by allowing them to securely share Inbound Connectors.

2.3 Scripts

Scripts are user-defined instructions in SQL query format for processing input data securely within Fortanix Confidential Computing Manager. To execute specific functions securely, users can create, save, and share SQL queries through the Scripts feature. The users can utilize the Query interface, users can seamlessly create, save, and share SQL queries for secure data processing.

2.4 Workflows

The workflows provide a visual representation of interconnected components for efficient data processing.

3.0 Key Features

This section lists the key features of Fortanix Confidential Computing Manager:

Picture1.png

  • Infrastructure Control: With the “bring your infrastructure" feature, you can maintain complete control over your data by leveraging your existing infrastructure setups. You can seamlessly integrate the collaboration platform into your current systems without the need for extensive overhauls.
  • Workflow Management and Automation: The platform offers rich workflow management and automation capabilities. You can define, customize, and automate your computing manager processes, streamlining operations and ensuring efficiency. Additionally, the platform provides tools for tracking these workflows, enabling you to monitor progress and ensure compliance with privacy and security guidelines throughout the process.
  • Access Control: You have granular control over data access permissions. You can specify who has access to which data and define the level of privileges associated with that access. This ensures that sensitive information is only accessible to authorized individuals or entities, enhancing data security and compliance.
  • Independent Verification: Fortanix CCM employs independent verification mechanisms to ensure the integrity and trustworthiness of data transactions. By adopting a zero-trust approach, the platform enhances transparency and accountability, providing you with confidence in the accuracy and reliability of transaction records.
  • Visibility: The platform offers comprehensive monitoring and tracking capabilities, allowing you to closely monitor data access activities and user interactions in real-time. This visibility enables you to detect and respond to potential security threats or compliance issues promptly, enhancing overall data governance and risk management practices.
  • Low Code or No Code: Fortanix Confidential Computing Manager simplifies the development, automation, and governance processes with its low-code/no-code capabilities. You can leverage these tools to customize workflows, automate tasks, and enforce governance policies without the need for extensive coding knowledge. This promotes agility and efficiency within your organization.
  • Privacy Enhancement: The platform incorporates advanced privacy-preserving techniques to protect the confidentiality of sensitive data. By implementing privacy-enhancing features, such as data anonymization and encryption, the platform ensures that data remains secure and private throughout its lifecycle, without compromising system functionality or usability.
  • Confidential Computing: Leveraging confidential computing technology, Fortanix Confidential Computing Manager secures data at every stage of its lifecycle. Whether data is at rest, in transit, or in use, the platform employs robust encryption and isolation mechanisms to safeguard against unauthorized access and data breaches. This ensures that sensitive information remains protected even in potentially vulnerable environments.

Comments

Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful