Download Publication

Who it's for:
- Data security professionals
- Healthcare professionals
Healthcare Confidential Computing and the Trusted Execution Environment
Release Date: 07/14/2025
Updated On: 07/16/2025
- What confidential computing is, how it works, and its key use cases
- The different types of homomorphic encryption
- What a trusted platform module (TPM) is and how to use it
- The different types of hardware security modules (HSMs) and how they work
- The main features of the TEE
- How confidential computing supports healthcare data security needs
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Acknowledgements

Dr. Jim Angle
Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...

Alex Kaluza
Research Analyst, CSA

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.
He has co-chaired...

Tanna Jiwnani
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more