SAFEGUARDING SENSITIVE INFORMATION USING CONFIDENTIAL COMPUTING ENCLAVES