Skip to content

Commit f39b548

Browse files
Merge pull request #292090 from linuxelf001/patch-33
Update confidential-vm-faq.yml
2 parents 5704ee1 + b25dad2 commit f39b548

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/confidential-computing/confidential-vm-faq.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,16 @@ sections:
132132
answer: |
133133
No. After you've created a confidential VM, you can't deactivate or reactivate full-disk encryption. Create a new confidential VM instead.
134134
135+
- question: |
136+
Is it possible to switch between Platform-managed keys and Customer-managed keys after a VM has been created?
137+
answer: |
138+
No, the choice of key management (Platform-managed or Customer-managed) is only available during VM creation and cannot be changed afterward.
139+
140+
- question: |
141+
Can I use a Customer-managed key if I don't enable full-disk encryption for the OS disk?
142+
answer: |
143+
No, if a Confidential VM is created without full-disk encryption of the OS disk, a Customer-managed key cannot be used. In this case, the VMGS disk, which is always encrypted, will be encrypted using a Platform-managed key (PMK).
144+
135145
- question: |
136146
Can I control more aspects of the Trusted Computing Base to enforce operator independent key management, attestation, and disk encryption?
137147
answer: |

0 commit comments

Comments
 (0)