As an illustration, a manager may have whole use of a confidential functionality report, even though their personnel can only read through the doc, without any option to edit or share it with colleagues.
It represents https://hannajwtt806386.idblogz.com/30216653/detailed-notes-on-confidential-computing