Skip to content

Commit 229daa1

Browse files
authored
Update overview.md
1 parent 87269f4 commit 229daa1

File tree

1 file changed

+1
-5
lines changed

1 file changed

+1
-5
lines changed

articles/attestation/overview.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,13 +46,9 @@ OE standardizes specific requirements for verification of an enclave evidence. T
4646

4747
Client applications can be designed to take advantage of TPM attestation by delegating security-sensitive tasks to only take place after a platform has been validated to be secure. Such applications can then make use of Azure Attestation to routinely establish trust in the platform and its ability to access sensitive data.
4848

49-
### Trusted Launch attestation
50-
51-
Azure customers can [prevent bootkit and rootkit infections](https://www.youtube.com/watch?v=CQqu_rTSi0Q) by enabling [Trusted launch](/azure/virtual-machines/trusted-launch) for their virtual machines. When the VM is Secure Boot and vTPM enabled with guest attestation extension installed, vTPM measurements get submitted to Azure Attestation for monitoring of boot integrity. An attestation failure indicates potential malware, which is surfaced to customers via Azure Security Center for recommendations, alerts, and remediations.
52-
5349
### Azure Confidential VM attestation
5450

55-
Azure [Confidential VM](/azure/confidential-computing/confidential-vm-overview) (CVM) is based on [AMD processors with SEV-SNP technology](/azure/confidential-computing/virtual-machine-solutions-amd) and aims to improve VM security posture by removing trust in host, hypervisor and Cloud Service Provider (CSP). To achieve this, CVM offers VM OS disk encryption option with platform-managed keys and binds the disk encryption keys to the virtual machine's TPM. In this option, when a CVM creation is initiated, host sends a measurement of guest VM firmware running in SEV-SNP to Azure Attestation. The service validates the measurements and issues a token that is used to fetch keys from [Managed-HSM](/azure/key-vault/managed-hsm/overview). These keys are used to decrypt the vTPM state of the guest VM, unlock the OS disk and start the CVM. No customer action is needed to call Azure Attestation and the CVM will start only upon successful attestation.
51+
Azure [Confidential VM](/azure/confidential-computing/confidential-vm-overview) (CVM) is based on [AMD processors with SEV-SNP technology](/azure/confidential-computing/virtual-machine-solutions-amd) and aims to improve VM security posture by removing trust in host, hypervisor and Cloud Service Provider (CSP). To achieve this, CVM offers VM OS disk encryption option with platform-managed keys and binds the disk encryption keys to the virtual machine's TPM. When a CVM boots up, SNP report containing the guest VM firmware measurements will be sent to Azure Attestation. The service validates the measurements and issues an attestation token that is used to release keys from [Managed-HSM](/azure/key-vault/managed-hsm/overview) or [Azure Key Vault](/azure/key-vault/general/basic-concepts). These keys are used to decrypt the vTPM state of the guest VM, unlock the OS disk and start the CVM. The attestation and key release process is performed automatically on each CVM boot, and the process ensures the CVM boots up only upon successful attestation of the hardware.
5652

5753
## Azure Attestation can run in a TEE
5854

0 commit comments

Comments
 (0)