Confidential Computing

Improve isolation of sensitive data payloads with hardware-based enhanced memory protections.