Confidential computing protects data in use (while being processed) through hardware-based Trusted Execution Environments (TEEs). Intel SGX, AMD SEV are examples.
Completes the encryption trilogy: at rest + in transit + in use. Critical for cloud environments where the CSP could theoretically access running workloads. Emerging tech but appearing on exams.