You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-vm-overview.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,24 +22,24 @@ Some of the benefits of confidential VMs include:
22
22
23
23
- Robust hardware-based isolation between virtual machines, hypervisor, and host management code.
24
24
- Customizable attestation policies to ensure the host's compliance before deployment.
25
-
- Cloud-based full-disk encryption before the first boot.
25
+
- Cloud-based Confidential OS disk encryption before the first boot.
26
26
- VM encryption keys that the platform or the customer (optionally) owns and manages.
27
27
- Secure key release with cryptographic binding between the platform's successful attestation and the VM's encryption keys.
28
28
- Dedicated virtual [Trusted Platform Module (TPM)](/windows/security/information-protection/tpm/trusted-platform-module-overview) instance for attestation and protection of keys and secrets in the virtual machine.
29
29
- Secure boot capability similar to [Trusted launch for Azure VMs](../virtual-machines/trusted-launch.md)
30
30
31
-
## Full-disk encryption
31
+
## Confidential OS disk encryption
32
32
33
33
Azure confidential VMs offer a new and enhanced disk encryption scheme. This scheme protects all critical partitions of the disk. It also binds disk encryption keys to the virtual machine's TPM and makes the protected disk content accessible only to the VM. These encryption keys can securely bypass Azure components, including the hypervisor and host operating system. To minimize the attack potential, a dedicated and separate cloud service also encrypts the disk during the initial creation of the VM.
34
34
35
35
If the compute platform is missing critical settings for your VM's isolation, then during boot [Azure Attestation](https://azure.microsoft.com/services/azure-attestation/) won't attest to the platform's health. It will prevent the VM from starting. For example, this scenario happens if you haven't enabled SEV-SNP.
36
36
37
-
Full-disk encryption is optional, because this process can lengthen the initial VM creation time. You can choose between:
37
+
Confidential OS disk encryption is optional, because this process can lengthen the initial VM creation time. You can choose between:
38
38
39
-
- A confidential VM with full OS disk encryption before VM deployment that uses platform-managed keys (PMK) or a customer-managed key (CMK).
40
-
- A confidential VM without OS disk encryption before VM deployment.
39
+
- A confidential VM with Confidential OS disk encryption before VM deployment that uses platform-managed keys (PMK) or a customer-managed key (CMK).
40
+
- A confidential VM without Confidential OS disk encryption before VM deployment.
41
41
42
-
For further integrity and protection, confidential VMs offer [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) by default.
42
+
For further integrity and protection, confidential VMs offer [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) by default when confidential OS disk encryption is selected.
43
43
With Secure Boot, trusted publishers must sign OS boot components (including the boot loader, kernel, and kernel drivers). All compatible confidential VM images support Secure Boot.
0 commit comments