You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/tdx-confidential-vm-overview
+9-96Lines changed: 9 additions & 96 deletions
Original file line number
Diff line number
Diff line change
@@ -11,105 +11,18 @@ ms.date: 4/25/2023
11
11
12
12
# DCesv5 and ECesv5 series confidential VMs
13
13
14
-
Azure confidential computing offers confidential VMs based on [AMD processors with SEV-SNP technology](virtual-machine-solutions-amd.md). Confidential VMs are for tenants with high security and confidentiality requirements. These VMs provide a strong, hardware-enforced boundary to help meet your security needs. You can use confidential VMs for migrations without making changes to your code, with the platform protecting your VM's state from being read or modified.
14
+
Starting with the 4th Gen Intel® Xeon® Scalable processors, Azure has begun supporting VMs backed by an all-new hardware-based Trusted Execution Environment called [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html#inpage-nav-2). Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to their applications.
15
15
16
16
> [!IMPORTANT]
17
-
> Protection levels differ based on your configuration and preferences. For example, Microsoft can own or manage encryption keys for increased convenience at no additional cost.
17
+
> DCesv5 and ECesv5 are now available in preview, customers can sign-up [today](https://aka.ms/TDX-signup).
18
18
19
19
## Benefits
20
20
21
-
Some of the benefits of confidential VMs include:
21
+
Some of the benefits of Confidential VMs with Intel TDX include:
22
22
23
-
- Robust hardware-based isolation between virtual machines, hypervisor, and host management code.
24
-
- Customizable attestation policies to ensure the host's compliance before deployment.
25
-
- Cloud-based Confidential OS disk encryption before the first boot.
26
-
- VM encryption keys that the platform or the customer (optionally) owns and manages.
27
-
- Secure key release with cryptographic binding between the platform's successful attestation and the VM's encryption keys.
28
-
- Dedicated virtual [Trusted Platform Module (TPM)](/windows/security/information-protection/tpm/trusted-platform-module-overview) instance for attestation and protection of keys and secrets in the virtual machine.
29
-
- Secure boot capability similar to [Trusted launch for Azure VMs](../virtual-machines/trusted-launch.md)
30
-
31
-
## Confidential OS disk encryption
32
-
33
-
Azure confidential VMs offer a new and enhanced disk encryption scheme. This scheme protects all critical partitions of the disk. It also binds disk encryption keys to the virtual machine's TPM and makes the protected disk content accessible only to the VM. These encryption keys can securely bypass Azure components, including the hypervisor and host operating system. To minimize the attack potential, a dedicated and separate cloud service also encrypts the disk during the initial creation of the VM.
34
-
35
-
If the compute platform is missing critical settings for your VM's isolation, then during boot [Azure Attestation](https://azure.microsoft.com/services/azure-attestation/) won't attest to the platform's health. It will prevent the VM from starting. For example, this scenario happens if you haven't enabled SEV-SNP.
36
-
37
-
Confidential OS disk encryption is optional, because this process can lengthen the initial VM creation time. You can choose between:
38
-
39
-
- A confidential VM with Confidential OS disk encryption before VM deployment that uses platform-managed keys (PMK) or a customer-managed key (CMK).
40
-
- A confidential VM without Confidential OS disk encryption before VM deployment.
41
-
42
-
For further integrity and protection, confidential VMs offer [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) by default when confidential OS disk encryption is selected.
43
-
With Secure Boot, trusted publishers must sign OS boot components (including the boot loader, kernel, and kernel drivers). All compatible confidential VM images support Secure Boot.
44
-
45
-
### Encryption pricing differences
46
-
47
-
Azure confidential VMs use both the OS disk and a small encrypted virtual machine guest state (VMGS) disk of several megabytes. The VMGS disk contains the security state of the VM's components. Some components include the vTPM and UEFI bootloader. The small VMGS disk might incur a monthly storage cost.
48
-
49
-
From July 2022, encrypted OS disks will incur higher costs. This change is because encrypted OS disks use more space, and compression isn't possible. For more information, see [the pricing guide for managed disks](https://azure.microsoft.com/pricing/details/managed-disks/).
50
-
51
-
## Attestation and TPM
52
-
53
-
Azure confidential VMs boot only after successful attestation of the platform's critical components and security settings. The attestation report includes:
54
-
55
-
- A signed attestation report issued by AMD SEV-SNP
56
-
- Platform boot settings
57
-
- Platform firmware measurements
58
-
- OS measurements
59
-
60
-
You can initialize an attestation request inside of a confidential VM to verify that your confidential VMs are running a hardware instance with AMD SEV-SNP enabled processors. For more information, see [Azure confidential VM guest attestation](https://aka.ms/CVMattestation).
61
-
62
-
Azure confidential VMs feature a virtual TPM (vTPM) for Azure VMs. The vTPM is a virtualized version of a hardware TPM, and complies with the TPM2.0 spec. You can use a vTPM as a dedicated, secure vault for keys and measurements. Confidential VMs have their own dedicated vTPM instance, which runs in a secure environment outside the reach of any VM.
63
-
64
-
## Limitations
65
-
66
-
The following limitations exist for confidential VMs. For frequently asked questions, see [FAQ about confidential VMs with AMD processors](./confidential-vm-faq-amd.yml).
67
-
68
-
### Size support
69
-
70
-
Confidential VMs support the following VM sizes:
71
-
72
-
- DCasv5-series
73
-
- DCadsv5-series
74
-
- ECasv5-series
75
-
- ECadsv5-series
76
-
77
-
For more information, see the [AMD deployment options](virtual-machine-solutions-amd.md).
78
-
### OS support
79
-
80
-
Confidential VMs support the following OS options:
81
-
82
-
- Ubuntu 20.04 LTS
83
-
- Ubuntu 22.04 LTS
84
-
- Windows Server 2019
85
-
- Windows Server 2022
86
-
87
-
### Regions
88
-
89
-
Confidential VMs run on specialized hardware available in specific [VM regions](https://azure.microsoft.com/global-infrastructure/services/?products=virtual-machines).
90
-
91
-
### Pricing
92
-
93
-
Pricing depends on your confidential VM size. For more information, see the [Pricing Calculator](https://azure.microsoft.com/pricing/calculator/).
94
-
95
-
### Feature support
96
-
97
-
Confidential VMs *don't support*:
98
-
99
-
- Azure Batch
100
-
- Azure Backup
101
-
- Azure Site Recovery
102
-
- Azure Dedicated Host
103
-
- Microsoft Azure Virtual Machine Scale Sets with Confidential OS disk encryption enabled
104
-
- Limited Azure Compute Gallery support
105
-
- Shared disks
106
-
- Ultra disks
107
-
- Accelerated Networking
108
-
- Live migration
109
-
- Screenshots under boot diagnostics
110
-
111
-
112
-
## Next steps
113
-
114
-
> [!div class="nextstepaction"]
115
-
> [Deploy a confidential VM on AMD from the Azure portal](quick-create-confidential-vm-portal-amd.md)
23
+
- Support for general-purpose and memory-optimized virtual machines.
24
+
- Improved performance for compute, memory, IO and network-intensive workloads.
25
+
- Ability for organizations to retrieve raw hardware evidence and submit for judgment for attestation, including open-sourcing our client application.
26
+
- Support for [Microsoft Azure Attestation](https://learn.microsoft.com/en-us/azure/attestation/) (coming soon) backed by high availability zonal capabilities and disaster recovery capabilities.
27
+
- Support for operator-independent remote attestation with [Intel Project Amber](http://projectamber.intel.com/).
28
+
- Support for Ubuntu 22.04, SUSE Linux Enterprise Server 15 SP5 and SUSE Linux Enterprise Server for SAP 15 SP5
0 commit comments