A Confidential Virtual Machine (Confidential VM) is a type of N2D Compute Engine VM running on hosts based on the second generation of AMD Epyc processors, code-named "Rome." Using AMD Secure Encrypted Virtualization (SEV), Confidential VM features built-in optimization of both performance and security for enterprise-class high memory workloads, as well as inline memory encryption that doesn't introduce significant performance penalty to those workloads.
You can select the Confidential VM service when creating a new VM using
the Google Cloud Console, the Compute Engine API, or the
The AMD Rome processor family is specifically optimized for compute-heavy workloads, with high memory capacity, high throughput, and support for parallel workloads. In addition, AMD SEV provides for Confidential Computing support.
AMD SEV offers high performance for the most demanding computational tasks, while keeping all memory encrypted with a dedicated per-VM instance key that is generated by hardware. These keys are generated by the AMD Platform Security Processor (PSP) during VM creation and reside solely within the processor. These keys are not accessible by Google.
Security and privacy features
Along with encryption of data in transit and at rest using customer-managed encryption keys (CMEK) and customer-supplied encryption keys (CSEK), Confidential VM adds a "third pillar" to the end-to-end encryption story by encrypting data while in use. With the confidential execution environments provided by Confidential VM and AMD SEV, Google Cloud keeps customers' sensitive code and other data encrypted in memory during processing. Google does not have access to the encryption keys. In addition, Confidential VM can help alleviate concerns about risk related to either dependency on Google infrastructure or Google insiders' access to customer data in the clear.
Main memory encryption is performed using dedicated hardware within the on-die memory controllers. Each controller includes a high-performance Advanced Encryption Standard (AES) engine. The AES engine encrypts data as it is written to DRAM or shared between sockets, and decrypts it when data is read.
- To quickly get started creating a new Confidential VM instance, see Quickstart: Creating a Confidential VM instance.
- For in-depth instructions about how to create a new Confidential VM instance, see Creating a Confidential VM instance.
- To learn about monitoring the state of your Confidential VM instance, see Validating Confidential VM using Cloud Monitoring.