Skip to content

Commit 6ba0e42

Browse files
authored
Merge pull request #274020 from michamcr/patch-115
Update confidential-vm-faq.yml
2 parents 21fa2fc + 4a3ebeb commit 6ba0e42

File tree

1 file changed

+41
-35
lines changed

1 file changed

+41
-35
lines changed

articles/confidential-computing/confidential-vm-faq.yml

Lines changed: 41 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -11,66 +11,71 @@ metadata:
1111
title: Azure confidential virtual machines FAQ
1212
summary: |
1313
14-
This article provides answers to some of the most common questions about [confidential VMs](confidential-vm-overview.md).
14+
This article provides answers to some of the most common questions about [confidential virtual machines (VMs)](confidential-vm-overview.md).
1515
1616
sections:
1717
- name: General
1818
questions:
1919
- question: |
2020
What are confidential VMs?
2121
answer: |
22-
Confidential VMs are IaaS VMs for tenants with especially high security and confidentiality requirements. Confidential VMs offer access to the following technologies and benefits:
23-
- Encryption for "data in use”, including the processor state and the virtual machine’s memory. Keys are generated by the processor and never leave it.
24-
- Host attestation to verify the full health and compliance of the server before initializing a confidential VM.
25-
- Encryption of "data at rest." A Hardware Security Module (HSM) can be used to guard the keys, which the tenant exclusively owns.
22+
Confidential VMs are an IaaS solution for tenants with high security and confidentiality requirements. Confidential VMs offer:
23+
- Encryption for "data in use”, including the processor state and the virtual machine’s memory. The keys are generated by the processor and never leave it.
24+
- Host attestation helps you verify the full health and compliance of the server before data processing begins.
25+
- Hardware Security Module (HSM) can be attached to guard the keys of confidential VM disks, which the tenant exclusively owns.
2626
- New UEFI boot architecture supporting the guest OS for enhanced security settings and capabilities.
27-
- A dedicated virtual instance of a Trusted Platform Module (TPM). Certifies the health of the VM and provides hardened key management functions. Supports use cases such as BitLocker.
27+
- A dedicated virtual Trusted Platform Module (TPM) certifies the health of the VM, provides hardened key management, and supports use cases such as BitLocker.
2828
2929
- question: |
3030
Why should I use confidential VMs?
3131
answer: |
3232
Confidential VMs address customer concerns about moving sensitive workloads off-premise into the cloud.
33-
Confidential VMs provide significantly elevated protections for customer data from the underlying infrastructure and cloud operators.
33+
Confidential VMs provide elevated protections for customer data from the underlying infrastructure and cloud operators.
3434
Unlike other approaches and solutions, you don't have to adapt your existing workloads to fit the platform's technical needs.
3535
3636
- question: |
37-
What are AMD SEV-SNP technologies and how do they relate to Azure confidential VMs?
37+
What is AMD SEV-SNP, and how does it relate to Azure confidential VMs?
3838
answer: |
39-
AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) technology offers multiple protections.
40-
For example, memory encryption, unique CPU keys, encryption for the processor register state, strong integrity protection, firmware rollback prevention, side channel hardening, and restrictions on interrupt and exceptions behavior.
39+
SEV-SNP stands for Secure Encrypted Virtualization-Secure Nested Paging. It's a Trusted Execution Environment (TEE) technology provided by AMD and offers multiple protections:
40+
For example, memory encryption, unique CPU keys, encryption for the processor register state, integrity protection, firmware rollback prevention, side channel hardening, and restrictions on interrupt and exceptions behavior.
4141
Collectively, AMD SEV technologies harden guest protections to deny hypervisor and other host management code access to VM memory and state.
42-
Confidential VMs combine AMD SEV-SNP with Azure technologies such as full-disk encryption and [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md).
42+
Confidential VMs leverages AMD SEV-SNP with Azure technologies such as full-disk encryption and [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md).
4343
You can encrypt data in use, in transit, and at rest with keys that you control.
44-
With built-in [Azure Attestation](https://azure.microsoft.com/services/azure-attestation/) capabilities, you can independently establish trust in the security, health and underlying infrastructure of your confidential VMs.
44+
With built-in [Azure Attestation](https://azure.microsoft.com/services/azure-attestation/) capabilities, you can independently establish trust in the security, health, and underlying infrastructure of your confidential VMs.
4545
4646
- question: |
47-
What are Intel TDX technologies and how do they relate to Azure confidential VMs?
47+
What is Intel TDX technologies and how do they relate to Azure confidential VMs?
4848
answer: |
49-
Intel Trust Domain Extensions (Intel TDX) offers multiple protections.
50-
Intel TDX uses hardware extensions for managing and encrypting memory and protects both the confidentiality and integrity of the TD CPU state.
51-
Additionally, Intel TDX helps to harden the virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state.
49+
Intel TDX stands for Intel Trust Domain Extensions (Intel TDX) It a Trusted Execution Environment (TEE) technology provided by Intel and offers multiple protections:
50+
Intel TDX uses hardware extensions for managing and encrypting memory and protects both the confidentiality and integrity of the CPU state.
51+
Additionally, Intel TDX helps to harden the virtualized environment by denying the hypervisor, other host management code, and administrators access to the VM memory and state.
5252
Confidential VMs combine Intel TDX with Azure technologies such as full-disk encryption and [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md).
5353
You can encrypt data in use, in transit, and at rest with keys that you control.
5454
5555
- question: |
5656
How do Azure confidential VMs offer better protection against threats originating from both within and outside Azure cloud infrastructure?
5757
answer: |
5858
Azure VMs already offer industry leading security and protection against other tenants and malicious intruders.
59-
Azure confidential VMs augment these protections by using hardware-based TEEs (Trusted Execution Environment) which leverage AMD’s SEV-SNP and Intel TDX to cryptographically isolate and protect your data confidentiality and integrity even when they are in use.
60-
This means neither host admins, nor services (including the Azure hypervisor) can directly view or modify the memory or CPU state of your VM.
61-
Moreover, with full attestation capability, full OS disk encryption and hardware-protected virtual Trusted Platform Modules, confidential VM persistent state is protected such that neither your private keys, nor the contents of your memory are ever exposed to the hosting environment.
59+
Azure confidential VMs augment these protections by using hardware-based TEEs such as AMD SEV-SNP and Intel TDX to cryptographically isolate and protect your data confidentiality and integrity.
60+
No host admins, or host services (including the Azure hypervisor) can directly view or modify the memory or CPU state of your confidential VM.
61+
Moreover, with full attestation capability, full OS disk encryption, and hardware-protected virtual Trusted Platform Modules, the persistent state is protected such that your private keys, and the contents of your memory are not exposed to the hosting environment unencrypted.
6262
6363
- question: |
6464
Are the virtual disks attached to confidential VMs automatically protected?
6565
answer: |
6666
Currently OS disks for confidential VMs can be encrypted and secured.
67-
For additional security, you can enable guest level encryption (such as BitLocker or dm-crypt) for all data drives.
67+
For extra security, you can enable guest level encryption (such as BitLocker or dm-crypt) for all data drives.
6868
6969
- question: |
7070
Does memory written to the Windows swap file (pagefile.sys) get protected by the TEE?
7171
answer: |
7272
Yes, but only if the pagefile.sys is located on the encrypted OS disk.
7373
On confidential VMs with a temp disk, the pagefile.sys file can be moved to the encrypted OS [Tips for moving pagefile.sys to the c:\ drive](../virtual-machines/windows/change-drive-letter.md).
74+
75+
- question: |
76+
Can I generate a memory dump from within my confidential VM?
77+
answer: |
78+
No, this capability doesn't exist for confidential VMs.
7479
7580
- question: |
7681
How can I deploy Azure confidential VMs?
@@ -83,23 +88,24 @@ sections:
8388
- question: |
8489
Can I perform attestation for my AMD-based confidential VMs?
8590
answer: |
86-
Azure confidential VMs on AMD SEV-SNP undergo attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system in conjunction with the Microsoft Azure Attestation and Azure Key Vault services.
91+
Azure confidential VMs on AMD SEV-SNP undergo attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system with the Microsoft Azure Attestation and Azure Key Vault services.
8792
Confidential VMs also allow users to perform independent attestation for their confidential VMs.
8893
This attestation happens using new tooling called [Azure confidential VM Guest Attestation](https://aka.ms/CVMattestation). Guest attestation allows customers to attest that their confidential VMs are running on AMD processors with SEV-SNP enabled.
8994
9095
- question: |
9196
Can I perform attestation for my Intel-based confidential VMs?
9297
answer: |
93-
Azure confidential VMs on Intel TDX have the option of including attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system in conjunction with the Microsoft Azure Attestation and Azure Key Vault services.
94-
Support for in-guest [attestation](guest-attestation-confidential-vms.md) will be available via the vTPM. You can use this to validate the entire stack from the hardware platform to the guest application layer. The functionality exists on AMD SEV-SNP today and will soon be released for Intel TDX. Today, only in-guest platform attestation is available for Intel TDX. This allows you to verify that your VM is running on Intel TDX hardware. To access this preview feature, visit our [preview branch](https://github.com/Azure/confidential-computing-cvm-guest-attestation/tree/tdx-preview).
98+
Azure confidential VMs using Intel TDX can be attested transparently as part of the boot flow to ensure the platform is compliant and up-to-date. The process is opaque to the user and takes place using Microsoft Azure Attestation and Azure Key Vault.
99+
If you would like to go further to perform checks post-boot, in-guest platform attestation is available. This allows you to verify that your VM is running on genuine Intel TDX. To access the feature, visit our [preview branch](https://github.com/Azure/confidential-computing-cvm-guest-attestation/tree/tdx-preview).
95100
Additionally, we support [Intel® Trust Authority](https://www.intel.com/content/www/us/en/security/trust-authority.html) for enterprises seeking operator independent attestation.
101+
Support for full in-guest [attestation](guest-attestation-confidential-vms.md), similar to AMD SEV-SNP is coming soon. This allows organizations to go deeper, and validate further aspects, even down to the guest application layer.
96102
97103
- question: |
98104
Do all OS images work with confidential VMs?
99105
answer: |
100106
To run on a confidential VM, OS images must meet certain security and compatibility requirements.
101107
This allows confidential VMs to be securely mounted, attested to, and isolated from the underlying cloud infrastructure.
102-
In the future we plan to provide guidance on how to take a custom Linux build and apply a set of open-source patches to qualify it as a confidential VM image.
108+
In the future, we plan to provide guidance on how to take a custom Linux build and apply a set of open-source patches to qualify it as a confidential VM image.
103109
104110
- question: |
105111
Can I customize one of the available confidential VM images?
@@ -117,21 +123,21 @@ sections:
117123
- question: |
118124
Since Azure confidential VMs support virtual TPM, can I seal secrets/keys to my confidential VM virtual TPM?
119125
answer: |
120-
Each Azure confidential VM has its own virtual TPM, where customers can seal their secrets/keys. It is recommended for customers to verify vTPM status (via TPM.msc for Windows VMs).
121-
If status is not ready for use, we recommend that you reboot your VMs before sealing secrets/keys to vTPM.
126+
Each Azure confidential VM has its own virtual TPM, where customers can seal their secrets/keys. It's recommended for customers to verify vTPM status (via TPM.msc for Windows VMs).
127+
If status isn't ready for use, we recommend that you reboot your VMs before sealing secrets/keys to vTPM.
122128
123129
- question: |
124130
Can I enable or disable the new full-disk encryption scheme after VM creation?
125131
answer: |
126132
No. After you've created a confidential VM, you can't deactivate or reactivate full-disk encryption. Create a new confidential VM instead.
127133
128134
- question: |
129-
Can I control more aspects of the Trusted Computing Base to enforce operator independent key management, attestation and disk encryption?
135+
Can I control more aspects of the Trusted Computing Base to enforce operator independent key management, attestation, and disk encryption?
130136
answer: |
131137
Developers seeking further "separation of duties" for TCB services from the cloud service provider should use security type "NonPersistedTPM".
132-
- This experience is only available as part of the Intel TDX public preview. It has disclaimers in that, organizations that use it, or provide services with it are in control of the TCB and the responsibilities that come along with it.
133-
- This experience bypasses the native Azure services, allowing you to bring your own disk encryption, key management and attestation solution.
134-
- Each VM still has a vTPM, which should be used to retrieve hardware evidence, however the vTPM state is not persisted through reboots, meaning this solution is excellent for ephemeral workloads and organizations seeking further decoupling from the cloud service provider.
138+
- This experience is only available as part of the Intel TDX public preview. Organizations that use it, or provide services with it are in control of the TCB and the responsibilities that come along with it.
139+
- This experience bypasses the native Azure services, allowing you to bring your own disk encryption, key management, and attestation solution.
140+
- Each VM still has a vTPM, which should be used to retrieve hardware evidence, however the vTPM state isn't persisted through reboots, meaning this solution is excellent for ephemeral workloads and organizations wanting decoupling from the cloud service provider.
135141
136142
- question: |
137143
Can I convert a non-confidential VM into a confidential VM?
@@ -142,8 +148,8 @@ sections:
142148
Can I convert a DCasv5/ECasv5 CVM into a DCesv5/ECesv5 CVM or a DCesv5/ECesv5 CVM into a DCasv5/ECasv5 CVM?
143149
answer: |
144150
Yes, converting from one confidential VM to another confidential VM is allowed on both DCasv5/ECasv5 and DCesv5/ECesv5 in the regions that they share.
145-
If you are using a Windows image, please make sure you have all the most recent updates.
146-
If you are using a Ubuntu Linux image, please make sure you are using the Ubuntu 22.04 LTS confidential image with the minimum kernel version `6.2.0-1011-azure`.
151+
If you're using a Windows image, make sure you have all the most recent updates.
152+
If you're using an Ubuntu Linux image, make sure you're using the Ubuntu 22.04 LTS confidential image with the minimum kernel version `6.2.0-1011-azure`.
147153
148154
- question: |
149155
Why can't I find DCasv5/ECasv5 or DCesv5/ECesv5 VMs in the Azure portal size selector?
@@ -188,21 +194,21 @@ sections:
188194
answer: |
189195
Billing for confidential VMs depends on your usage and storage, and the size and region of the VM.
190196
Confidential VMs use a small encrypted virtual machine guest state (VMGS) disk of several megabytes. VMGS encapsulates the VM security state of components such the vTPM and UEFI bootloader. This disk might result in a monthly storage fee.
191-
Also, if you choose to enable the optional full-disk encryption, encrypted OS disks will incur higher costs.
197+
Also, if you choose to enable the optional full-disk encryption, encrypted OS disks incur higher costs.
192198
For more information on storage fees, see the [pricing guide for managed disks](https://azure.microsoft.com/pricing/details/managed-disks/).
193199
Lastly, for some high security and privacy settings, you might choose to create linked resources, such as a [Managed HSM Pool](../key-vault/managed-hsm/overview.md).
194200
Azure bills such resources separately from the confidential VM costs.
195201
196202
- question: |
197203
What can I do if the time on my DCesv5/ECesv5-series VM differs from UTC?
198204
answer: |
199-
Rarely some DCesv5/ECesv5-series VMs may experience a small time difference from UTC. A long term fix will be available for this soon. In the meantime here are the workarounds for Windows and Ubuntu Linux VMs:
205+
Rarely some DCesv5/ECesv5-series VMs may experience a small time difference from UTC. A long term fix is available for this soon. In the meantime here are the workarounds for Windows and Ubuntu Linux VMs:
200206
201207
``` Windows
202208
sc config vmictimesync start=disabled
203209
sc stop vmictimesync
204210
```
205-
For Ubuntu Linux images please run the following script:
211+
For Ubuntu Linux images, run the following script:
206212
207213
``` Ubuntu Linux
208214
#!/bin/bash

0 commit comments

Comments
 (0)