Skip to content

Commit 318cb2b

Browse files
Merge pull request #208733 from RunCai/main
Align Confidential VM OS disk encryption name with Azure disk encryption terminology.
2 parents 6e77daa + 6168e35 commit 318cb2b

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/confidential-computing/confidential-vm-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,24 +22,24 @@ Some of the benefits of confidential VMs include:
2222

2323
- Robust hardware-based isolation between virtual machines, hypervisor, and host management code.
2424
- Customizable attestation policies to ensure the host's compliance before deployment.
25-
- Cloud-based full-disk encryption before the first boot.
25+
- Cloud-based Confidential OS disk encryption before the first boot.
2626
- VM encryption keys that the platform or the customer (optionally) owns and manages.
2727
- Secure key release with cryptographic binding between the platform's successful attestation and the VM's encryption keys.
2828
- Dedicated virtual [Trusted Platform Module (TPM)](/windows/security/information-protection/tpm/trusted-platform-module-overview) instance for attestation and protection of keys and secrets in the virtual machine.
2929
- Secure boot capability similar to [Trusted launch for Azure VMs](../virtual-machines/trusted-launch.md)
3030

31-
## Full-disk encryption
31+
## Confidential OS disk encryption
3232

3333
Azure confidential VMs offer a new and enhanced disk encryption scheme. This scheme protects all critical partitions of the disk. It also binds disk encryption keys to the virtual machine's TPM and makes the protected disk content accessible only to the VM. These encryption keys can securely bypass Azure components, including the hypervisor and host operating system. To minimize the attack potential, a dedicated and separate cloud service also encrypts the disk during the initial creation of the VM.
3434

3535
If the compute platform is missing critical settings for your VM's isolation, then during boot [Azure Attestation](https://azure.microsoft.com/services/azure-attestation/) won't attest to the platform's health. It will prevent the VM from starting. For example, this scenario happens if you haven't enabled SEV-SNP.
3636

37-
Full-disk encryption is optional, because this process can lengthen the initial VM creation time. You can choose between:
37+
Confidential OS disk encryption is optional, because this process can lengthen the initial VM creation time. You can choose between:
3838

39-
- A confidential VM with full OS disk encryption before VM deployment that uses platform-managed keys (PMK) or a customer-managed key (CMK).
40-
- A confidential VM without OS disk encryption before VM deployment.
39+
- A confidential VM with Confidential OS disk encryption before VM deployment that uses platform-managed keys (PMK) or a customer-managed key (CMK).
40+
- A confidential VM without Confidential OS disk encryption before VM deployment.
4141

42-
For further integrity and protection, confidential VMs offer [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) by default.
42+
For further integrity and protection, confidential VMs offer [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) by default when confidential OS disk encryption is selected.
4343
With Secure Boot, trusted publishers must sign OS boot components (including the boot loader, kernel, and kernel drivers). All compatible confidential VM images support Secure Boot.
4444

4545
### Encryption pricing differences
@@ -99,7 +99,7 @@ Confidential VMs *don't support*:
9999
- Azure Backup
100100
- Azure Site Recovery
101101
- Azure Dedicated Host
102-
- Microsoft Azure Virtual Machine Scale Sets with full OS disk encryption enabled
102+
- Microsoft Azure Virtual Machine Scale Sets with Confidential OS disk encryption enabled
103103
- Limited Azure Compute Gallery support
104104
- Shared disks
105105
- Ultra disks

0 commit comments

Comments
 (0)