A query hit the database that no one was supposed to run. The logs showed it came from an account with “read-only” access. The data was safe only because the engine never decrypted it for that role. That’s the power of confidential computing mixed with granular database roles.
Confidential computing keeps data encrypted in use, not just at rest or in transit. Even the database process can’t read plain text unless the policy allows it. When this protection meets fine-grained roles, you get security that stops threats from the inside out.
Granular database roles mean more than “admin” or “user.” They shape who can query what, down to rows, columns, or even specific computed results. Every role can have a unique set of keys to unlock only the views it needs. This isn’t just access control — it’s cryptographic enforcement.
The shift from trust-based models to enforcement-based models changes how teams architect systems. Confidential computing moves sensitive workloads into secure enclaves. Data remains encrypted with keys bound to role-based policies. If the role doesn’t match, the secure enclave never reveals decrypted data, even if the query runs.