When you employ confidential compute, your information is kept securely isolated within the processing environment. This ensures that your data remains inaccessible to outside parties, including the infrastructure operators responsible for maintaining the hardware.