Skip to content

Commit

Permalink
Rendered draft.html
Browse files Browse the repository at this point in the history
  • Loading branch information
seanbaxter committed Sep 18, 2024
1 parent 1b9ea2a commit 23b0797
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 4 deletions.
23 changes: 21 additions & 2 deletions docs/draft.html
Original file line number Diff line number Diff line change
Expand Up @@ -526,8 +526,23 @@ <h2 data-number="1.1" id="the-call-for-memory-safety"><span class="header-sectio
quality and reduce vulnerabilities? What are the options for introducing
new memory safe code into existing projects and hardening software that
already exists?</p>
<p>There’s only one popular systems level/non-garbage collected language
that provides rigorous memory safety. That’s the Rust language.<span class="citation" data-cites="rust-language">[<a href="https://doc.rust-lang.org/book/" role="doc-biblioref">rust-language</a>]</span> Although they play in the
<blockquote>
<p>Decades of vulnerabilities have proven how difficult it is to prevent
memory-corrupting bugs when using C/C++. While garbage-collected
languages like C# or Java have proven more resilient to these issues,
there are scenarios where they cannot be used. For such cases, we’re
betting on Rust as the alternative to C/C++. Rust is a modern language
designed to compete with the performance C/C++, but with memory safety
and thread safety guarantees built into the language. While we are not
able to rewrite everything in Rust overnight, we’ve already adopted Rust
in some of the most critical components of Azure’s infrastructure. We
expect our adoption of Rust to expand substantially over time.</p>
<p><cite>Microsoft Azure security evolution: Embrace secure
multitenancy, Confidential Compute, and Rust</cite><span class="citation" data-cites="azure">[<a href="https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/" role="doc-biblioref">azure</a>]</span></p>
</blockquote>
<p>There’s only one mainstream systems level/non-garbage collected
language that provides rigorous memory safety. That’s the Rust
language.<span class="citation" data-cites="rust-language">[<a href="https://doc.rust-lang.org/book/" role="doc-biblioref">rust-language</a>]</span> Although they play in the
same space, C++ and Rust have different designs with limited interop
capability, making incremental migration from C++ to Rust a painstaking
process.</p>
Expand Down Expand Up @@ -4928,6 +4943,10 @@ <h1 data-number="5" id="bibliography"><span class="header-section-number">5</spa
<div id="ref-arc" class="csl-entry" role="doc-biblioentry">
[arc] Automatic reference counting. <a href="https://docs.swift.org/swift-book/documentation/the-swift-programming-language/automaticreferencecounting/"><div class="csl-block">https://docs.swift.org/swift-book/documentation/the-swift-programming-language/automaticreferencecounting/</div></a>
</div>
<div id="ref-azure" class="csl-entry" role="doc-biblioentry">
[azure] Microsoft Azure security evolution: Embrace secure multitenancy,
Confidential Compute, and Rust. <a href="https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/"><div class="csl-block">https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/</div></a>
</div>
<div id="ref-borrow-checking" class="csl-entry" role="doc-biblioentry">
[borrow-checking] The Rust RFC Book - Non-lexical lifetimes. <a href="https://rust-lang.github.io/rfcs/2094-nll.html"><div class="csl-block">https://rust-lang.github.io/rfcs/2094-nll.html</div></a>
</div>
Expand Down
4 changes: 2 additions & 2 deletions proposal/draft.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Security professionals urge projects to migrate away from C++ and adopt memory s

> Decades of vulnerabilities have proven how difficult it is to prevent memory-corrupting bugs when using C/C++. While garbage-collected languages like C# or Java have proven more resilient to these issues, there are scenarios where they cannot be used. For such cases, we’re betting on Rust as the alternative to C/C++. Rust is a modern language designed to compete with the performance C/C++, but with memory safety and thread safety guarantees built into the language. While we are not able to rewrite everything in Rust overnight, we’ve already adopted Rust in some of the most critical components of Azure’s infrastructure. We expect our adoption of Rust to expand substantially over time.
>
> -- <cite>Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust</cite>cite>[@azure]
> -- <cite>Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust</cite>[@azure]
There's only one mainstream systems level/non-garbage collected language that provides rigorous memory safety. That's the Rust language.[@rust-language] Although they play in the same space, C++ and Rust have different designs with limited interop capability, making incremental migration from C++ to Rust a painstaking process.

Expand Down Expand Up @@ -2833,7 +2833,7 @@ references:
- id: azure
citation-label: azure
title: Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust
title: Microsoft Azure security evolution&colon; Embrace secure multitenancy, Confidential Compute, and Rust
URL: https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/
- id: rust-language
Expand Down

0 comments on commit 23b0797

Please sign in to comment.