For illustration, a manager can have total access to a confidential functionality report, while their workers can only read through the document, without any choice to edit or share it with colleagues.
As encryption https://pennykxdi679464.theideasblog.com/30218795/detailed-notes-on-confidential-computing