📄️ Runtime Encryption
While encryption in transit (TLS) and at rest (disk encryption) have become widespread, confidential computing completes data protection.
📄️ Attestation
Continuum verifies the CVM's attestation statement to ensure that the involved services and workloads run on trusted hardware.
📄️ Sandboxing
In Continuum, workloads run in an isolated environment - a sandbox.