ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Download Publication

Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trusted Execution Environment
Who it's for:
  • Data security professionals
  • Healthcare professionals

Healthcare Confidential Computing and the Trusted Execution Environment

Release Date: 07/14/2025

Updated On: 07/16/2025

Healthcare Delivery Organizations (HDOs) routinely process Protected Health Information (PHI), Personally Identifiable Information (PII), and financial data. They must address threats that could compromise this data, not just at rest or in transit, but also in volatile states. 

Lately, HDOs are embracing AI to unlock new patient care and medical research possibilities. Now, protecting sensitive healthcare data has become all the more essential to building trust and ensuring compliance. Confidential computing provides a solution to address these concerns. 

This publication explores confidential computing and how it can support privacy and security in the healthcare industry. It also focuses on how the trusted execution environment (TEE) provides the environment for confidential computing. Understand why the healthcare sector should consider confidential computing in their architecture roadmaps, pilot projects, and compliance frameworks. Move toward scalable, privacy-preserving systems that strengthen security, enable innovation, and support regulatory alignment.

Key Takeaways:
  • What confidential computing is, how it works, and its key use cases
  • The different types of homomorphic encryption
  • What a trusted platform module (TPM) is and how to use it
  • The different types of hardware security modules (HSMs) and how they work
  • The main features of the TEE
  • How confidential computing supports healthcare data security needs
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
Related resources
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Secure Agentic System Design: A Trait-Based Approach
Secure Agentic System Design: A Trait-Based App...
AI Controls Matrix
AI Controls Matrix
Vulnerability Management Needs Agentic AI for Scale and Humans for Sense
Vulnerability Management Needs Agentic AI for Scale and Humans for ...
Published: 08/22/2025
Announcing the AI Controls Matrix and ISO/IEC 42001 Mapping — and the Roadmap to STAR for AI 42001
Announcing the AI Controls Matrix and ISO/IEC 42001 Mapping — and t...
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
The Definitive Catch-Up Guide to Agentic AI Authentication
The Definitive Catch-Up Guide to Agentic AI Authentication
Published: 08/18/2025
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Virtual

Acknowledgements

Dr. Jim Angle
Dr. Jim Angle

Dr. Jim Angle

Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Tanna Jiwnani Headshot Missing
Tanna Jiwnani

Tanna Jiwnani

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training