Shielded VM documentation
Shielded VM provides verifiable integrity of your Compute Engine VM instances, so you can be confident that your instances haven't been compromised by boot- or kernel-level malware or rootkits. Learn more.
Start your proof of concept with $300 in free credit
- Get access to Gemini 2.0 Flash Thinking
- Free monthly usage of popular products, including AI APIs and BigQuery
- No automatic charges, no commitment
Documentation resources
Related videos
Confidential Computing in Google Cloud
How do you secure sensitive data and workloads in the cloud, while still keeping it private? In this video, we address just that, and show you how to create a shielded VM in Google Cloud Console, and how to ensure encryption in-use for workloads with
Harden Your VMs with Shielded Computing (Cloud Next '19)
In just a few clicks, you can enable Shielded VMs to help protect against threats such as malicious project insiders, malicious guest firmware, and kernel- or user-mode vulnerabilities. Shielded VMs are virtual machines (VMs) on Google Cloud Platform