even if encrypted at rest, based on the place it’s encrypted, either the data or even the encryption keys may be liable to unauthorized accessibility. According to Gartner, by 2025, 50% of enormous businesses will adopt privacy-enhancing computation for processing data in untrusted environments to guard data in use.² With confidential container