-
Automating responses to integrity validation failures
Use a Cloud Functions trigger to automatically act on Shielded VM integrity monitoring events.
-
Creating custom shielded images
Prepare the disk, generate security certificates, and enable necessary operating system (OS) features to create a custom shielded image.
-
Monitoring integrity on Shielded VMs
Use Cloud Monitoring to monitor the boot integrity of Shielded VM instances.
-
Modifying Shielded VM options
Enable and disable Shielded VM options.
-
Retrieving endorsement keys
Retrieve the public portion of an endorsement key (EKPub) from a Shielded VM instance.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.