You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-vm-faq.yml
+14-14Lines changed: 14 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ sections:
30
30
Why should I use confidential VMs?
31
31
answer: |
32
32
Confidential VMs address customer concerns about moving sensitive workloads off-premise into the cloud.
33
-
Confidential VMs provide significantly elevated protections for customer data from the underlying infrastructure and cloud operators.
33
+
Confidential VMs provide elevated protections for customer data from the underlying infrastructure and cloud operators.
34
34
Unlike other approaches and solutions, you don't have to adapt your existing workloads to fit the platform's technical needs.
35
35
36
36
- question: |
@@ -56,15 +56,15 @@ sections:
56
56
How do Azure confidential VMs offer better protection against threats originating from both within and outside Azure cloud infrastructure?
57
57
answer: |
58
58
Azure VMs already offer industry leading security and protection against other tenants and malicious intruders.
59
-
Azure confidential VMs augment these protections by using hardware-based TEEs (Trusted Execution Environment) which leverage AMD’s SEV-SNP and Intel TDX to cryptographically isolate and protect your data confidentiality and integrity even when they are in use.
60
-
This means neither host admins, nor services (including the Azure hypervisor) can directly view or modify the memory or CPU state of your VM.
59
+
Azure confidential VMs augment these protections by using hardware-based TEEs (Trusted Execution Environment) which apply AMD’s SEV-SNP and Intel TDX to cryptographically isolate and protect your data confidentiality and integrity even when they are in use.
60
+
This means no host admins, nor services (including the Azure hypervisor) can directly view or modify the memory or CPU state of your VM.
61
61
Moreover, with full attestation capability, full OS disk encryption and hardware-protected virtual Trusted Platform Modules, confidential VM persistent state is protected such that neither your private keys, nor the contents of your memory are ever exposed to the hosting environment.
62
62
63
63
- question: |
64
64
Are the virtual disks attached to confidential VMs automatically protected?
65
65
answer: |
66
66
Currently OS disks for confidential VMs can be encrypted and secured.
67
-
For additional security, you can enable guest level encryption (such as BitLocker or dm-crypt) for all data drives.
67
+
For extra security, you can enable guest level encryption (such as BitLocker or dm-crypt) for all data drives.
68
68
69
69
- question: |
70
70
Does memory written to the Windows swap file (pagefile.sys) get protected by the TEE?
@@ -75,7 +75,7 @@ sections:
75
75
- question: |
76
76
Can I generate a memory dump from within my confidential VM?
77
77
answer: |
78
-
No, this capability does not exist for confidential VMs.
78
+
No, this capability doesn't exist for confidential VMs.
79
79
80
80
- question: |
81
81
How can I deploy Azure confidential VMs?
@@ -88,14 +88,14 @@ sections:
88
88
- question: |
89
89
Can I perform attestation for my AMD-based confidential VMs?
90
90
answer: |
91
-
Azure confidential VMs on AMD SEV-SNP undergo attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system in conjunction with the Microsoft Azure Attestation and Azure Key Vault services.
91
+
Azure confidential VMs on AMD SEV-SNP undergo attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system with the Microsoft Azure Attestation and Azure Key Vault services.
92
92
Confidential VMs also allow users to perform independent attestation for their confidential VMs.
93
93
This attestation happens using new tooling called [Azure confidential VM Guest Attestation](https://aka.ms/CVMattestation). Guest attestation allows customers to attest that their confidential VMs are running on AMD processors with SEV-SNP enabled.
94
94
95
95
- question: |
96
96
Can I perform attestation for my Intel-based confidential VMs?
97
97
answer: |
98
-
Azure confidential VMs on Intel TDX have the option of including attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system in conjunction with the Microsoft Azure Attestation and Azure Key Vault services.
98
+
Azure confidential VMs on Intel TDX have the option of including attestation as part of their boot phase. This process is opaque to the user and takes place in the cloud operating system with the Microsoft Azure Attestation and Azure Key Vault services.
99
99
Support for in-guest [attestation](guest-attestation-confidential-vms.md) will be available via the vTPM. You can use this to validate the entire stack from the hardware platform to the guest application layer. The functionality exists on AMD SEV-SNP today and will soon be released for Intel TDX. Today, only in-guest platform attestation is available for Intel TDX. This allows you to verify that your VM is running on Intel TDX hardware. To access this preview feature, visit our [preview branch](https://github.com/Azure/confidential-computing-cvm-guest-attestation/tree/tdx-preview).
100
100
Additionally, we support [Intel® Trust Authority](https://www.intel.com/content/www/us/en/security/trust-authority.html) for enterprises seeking operator independent attestation.
101
101
@@ -104,7 +104,7 @@ sections:
104
104
answer: |
105
105
To run on a confidential VM, OS images must meet certain security and compatibility requirements.
106
106
This allows confidential VMs to be securely mounted, attested to, and isolated from the underlying cloud infrastructure.
107
-
In the future we plan to provide guidance on how to take a custom Linux build and apply a set of open-source patches to qualify it as a confidential VM image.
107
+
In the future, we plan to provide guidance on how to take a custom Linux build and apply a set of open-source patches to qualify it as a confidential VM image.
108
108
109
109
- question: |
110
110
Can I customize one of the available confidential VM images?
@@ -122,8 +122,8 @@ sections:
122
122
- question: |
123
123
Since Azure confidential VMs support virtual TPM, can I seal secrets/keys to my confidential VM virtual TPM?
124
124
answer: |
125
-
Each Azure confidential VM has its own virtual TPM, where customers can seal their secrets/keys. It is recommended for customers to verify vTPM status (via TPM.msc for Windows VMs).
126
-
If status is not ready for use, we recommend that you reboot your VMs before sealing secrets/keys to vTPM.
125
+
Each Azure confidential VM has its own virtual TPM, where customers can seal their secrets/keys. It's recommended for customers to verify vTPM status (via TPM.msc for Windows VMs).
126
+
If status isn't ready for use, we recommend that you reboot your VMs before sealing secrets/keys to vTPM.
127
127
128
128
- question: |
129
129
Can I enable or disable the new full-disk encryption scheme after VM creation?
@@ -147,8 +147,8 @@ sections:
147
147
Can I convert a DCasv5/ECasv5 CVM into a DCesv5/ECesv5 CVM or a DCesv5/ECesv5 CVM into a DCasv5/ECasv5 CVM?
148
148
answer: |
149
149
Yes, converting from one confidential VM to another confidential VM is allowed on both DCasv5/ECasv5 and DCesv5/ECesv5 in the regions that they share.
150
-
If you are using a Windows image, please make sure you have all the most recent updates.
151
-
If you are using a Ubuntu Linux image, please make sure you are using the Ubuntu 22.04 LTS confidential image with the minimum kernel version `6.2.0-1011-azure`.
150
+
If you're using a Windows image, make sure you have all the most recent updates.
151
+
If you're using a Ubuntu Linux image, make sure you're using the Ubuntu 22.04 LTS confidential image with the minimum kernel version `6.2.0-1011-azure`.
152
152
153
153
- question: |
154
154
Why can't I find DCasv5/ECasv5 or DCesv5/ECesv5 VMs in the Azure portal size selector?
@@ -201,13 +201,13 @@ sections:
201
201
- question: |
202
202
What can I do if the time on my DCesv5/ECesv5-series VM differs from UTC?
203
203
answer: |
204
-
Rarely some DCesv5/ECesv5-series VMs may experience a small time difference from UTC. A long term fix will be available for this soon. In the meantime here are the workarounds for Windows and Ubuntu Linux VMs:
204
+
Rarely some DCesv5/ECesv5-series VMs may experience a small time difference from UTC. A long term fix is available for this soon. In the meantime here are the workarounds for Windows and Ubuntu Linux VMs:
205
205
206
206
``` Windows
207
207
sc config vmictimesync start=disabled
208
208
sc stop vmictimesync
209
209
```
210
-
For Ubuntu Linux images please run the following script:
210
+
For Ubuntu Linux images, run the following script:
0 commit comments