Wardley Map for Confidential Computing

A Wardley Map representing the value chain for Confidential Computing