Shielded VM provides verifiable integrity of your Compute Engine VM instances, so you can be confident that your instances haven't been compromised by boot- or kernel-level malware or rootkits. Learn more.

Get started for free

Start your proof of concept with $300 in free credit

  • Get access to Gemini 2.0 Flash Thinking
  • Free monthly usage of popular products, including AI APIs and BigQuery
  • No automatic charges, no commitment

Documentation resources

Find quickstarts and guides, review key references, and get help with common issues.

Related videos

How do you secure sensitive data and workloads in the cloud, while still keeping it private? In this video, we address just that, and show you how to create a shielded VM in Google Cloud Console, and how to ensure encryption in-use for workloads with

In just a few clicks, you can enable Shielded VMs to help protect against threats such as malicious project insiders, malicious guest firmware, and kernel- or user-mode vulnerabilities. Shielded VMs are virtual machines (VMs) on Google Cloud Platform