Shielded VMs
Shielded VMs on Google Cloud are protected against rootkits and bootkits by a set of security safeguards. Shielded VMs safeguard company workloads from dangers such as remote attacks, privilege escalation, and hostile insiders.
Shielded VMs’ verifiable integrity is achieved using the following features:
- Secure Boot
- Virtual trusted platform module (vTPM)-enabled Measured Boot
- Integrity monitoring
Let us look at each of them in more detail.
Secure Boot
Secure Boot checks all boot components’ digital signatures and stops the booting process if the signature verification fails. Let’s look at how Secure Boot for Shielded VMs works.
Shielded VM instances run software that has been certified and confirmed by Google’s Certificate Authority Service. This makes sure that the firmware of the instance hasn’t been changed and gives Secure Boot its foundation of trust. The UEFI 2.3.1 firmware protects the certificates...