Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Confidential VM adalah VM Compute Engine yang menggunakan
jenis mesin tertentu
dan menjaga kode sensitif Anda serta data lainnya tetap terenkripsi dalam memori selama
pemrosesan, yaitu, melakukan enkripsi saat digunakan.
Bersama dengan enkripsi dalam penyimpanan
dan enkripsi saat transit,
Confidential VM dapat membantu menjaga data dan aplikasi Anda tetap terenkripsi setiap saat.
Anda dapat menggunakan jaringan Virtual Private Cloud (VPC) bersama, batasan kebijakan organisasi, dan aturan firewall untuk menyiapkan perimeter keamanan yang memastikan bahwa instance Confidential VM Anda hanya dapat berinteraksi dengan instance Confidential VM lainnya.
Untuk meningkatkan keamanan block storage dengan Confidential VM, Anda dapat menggunakan
Mode rahasia untuk Hyperdisk Balanced.
Mode rahasia untuk Hyperdisk Balanced menambahkan lapisan keamanan lain dengan mengaktifkan enkripsi berbasis hardware pada data disk. Volume Hyperdisk dalam mode Rahasia menggunakan
Cloud HSM dan Trusted Execution Environment (TEE) untuk
memberikan isolasi kriptografi tambahan. Untuk mengetahui informasi selengkapnya tentang TEE, lihat
Penjelasan Trusted Execution Environment.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eConfidential VMs are Compute Engine VMs that encrypt sensitive code and data in memory during processing, using N2D, C2D, \u003ccode\u003ec3-standard-*\u003c/code\u003e, or C3D machine types.\u003c/p\u003e\n"],["\u003cp\u003eConfidential VMs provide encryption-in-use, complementing encryption-at-rest and encryption-in-transit, ensuring continuous data and application encryption.\u003c/p\u003e\n"],["\u003cp\u003eOrganization policies can be implemented to mandate the creation of Confidential VMs, and Cloud Monitoring and Cloud Logging are available to monitor and validate Confidential VM instances.\u003c/p\u003e\n"],["\u003cp\u003eFor enhanced security, Confidential mode for Hyperdisk Balanced can be used with Confidential VMs, leveraging hardware-based disk data encryption through Cloud HSM and trusted execution environments (TEEs).\u003c/p\u003e\n"],["\u003cp\u003eSecurity perimeter for Confidential VM interaction can be set up using shared VPC networks, org policies and firewall rules, allowing them to interact only with other Confidential VM instances.\u003c/p\u003e\n"]]],[],null,["*** ** * ** ***\n\nA Confidential VM is a Compute Engine VM that uses a\n[specific machine type](/confidential-computing/confidential-vm/docs/supported-configurations#machine-type-cpu-zone)\nand keeps your sensitive code and other data encrypted in memory during\nprocessing, that is, it performs *encryption-in-use* .\nTogether with [*encryption-at-rest*](/security/encryption/default-encryption)\nand [*encryption-in-transit*](/security/encryption-in-transit),\nConfidential VM can help keep your data and applications encrypted at\nall times.\n\nFor a more detailed conceptual overview, see\n[Confidential VM overview](/confidential-computing/confidential-vm/docs/confidential-vm-overview).\n\nTo get started using Confidential VM, see [Create a Confidential VM instance](/confidential-computing/confidential-vm/docs/create-a-confidential-vm-instance).\n\nYou can manage your Confidential VMs in some of the following ways:\n\n- You can use organization policy constraints to\n [ensure that instances created in your organization are Confidential VMs](/confidential-computing/confidential-vm/docs/enforce-confidential-vm-use).\n\n- You can use Cloud Monitoring and Cloud Logging to\n [monitor and validate your Confidential VM instances](/confidential-computing/confidential-vm/docs/monitor-integrity).\n\n- You can use shared Virtual Private Cloud (VPC) networks, organization policy\n constraints, and firewall rules to [set up a security perimeter](/confidential-computing/confidential-vm/docs/restrict-confidential-vm-interaction)\n that ensures your Confidential VM instances can only interact with\n other Confidential VM instances.\n\n- With the A3 machine series, you can create a Confidential VM instance\n that uses Intel TDX and has an attached\n GPU. For more information, see\n Confidential VM\n [supported configurations](/confidential-computing/confidential-vm/docs/supported-configurations).\n\nFor enhanced block storage security with Confidential VM, you can use\n[Confidential mode for Hyperdisk Balanced](/compute/docs/disks/disk-encryption#conf_hdb).\nConfidential mode for Hyperdisk Balanced adds another layer of security by enabling hardware-based encryption\nof disk data. Hyperdisk volumes in Confidential mode use\n[Cloud HSM](/kms/docs/hsm) and Trusted Execution Environments (TEE) to\nprovide additional cryptographic isolation. For more information about TEEs, see\n[Trusted Execution Environment Explainer](https://services.google.com/fh/files/misc/confidential_computing_overview.pdf)."]]