[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-03-06 UTC。"],[[["Confidential VMs are Compute Engine VMs that encrypt sensitive code and data in memory during processing, using N2D, C2D, `c3-standard-*`, or C3D machine types."],["Confidential VMs provide encryption-in-use, complementing encryption-at-rest and encryption-in-transit, ensuring continuous data and application encryption."],["Organization policies can be implemented to mandate the creation of Confidential VMs, and Cloud Monitoring and Cloud Logging are available to monitor and validate Confidential VM instances."],["For enhanced security, Confidential mode for Hyperdisk Balanced can be used with Confidential VMs, leveraging hardware-based disk data encryption through Cloud HSM and trusted execution environments (TEEs)."],["Security perimeter for Confidential VM interaction can be set up using shared VPC networks, org policies and firewall rules, allowing them to interact only with other Confidential VM instances."]]],[]]