Azure
Last updated
Was this helpful?
Last updated
Was this helpful?
Confidential Virtual Machines (Confidential VMs) are an offering within Azure Confidential Computing, designed for customers with demanding security and confidentiality requirements.
The Azure Confidential Virtual Machine AMD-SNP template offers Confidential VMs based on . These VMs provide a hardware-enforced boundary to help meet customer security needs. Customers can use confidential VMs for migration without making changes to the code, with the platform protecting their VM's state from being read or modified.
The template requires two prerequisites:
Active subscription to deploy this template
Owner or write permissions on the subscription in which the confidential VM should be deployed to
There's no hard dependency of , however we have implemented and tested this template under the SLZ confidential management group where existing confidential policies are enforced.
Note:
Common known issues and FAQ are listed in our page. If you cannot find an answer in the known issues page, then please log issues to
Open PowerShell 7.x.
Clone repo
Create a if you don't have an existing one.
Run the following commands to authenticate to Azure and to set the subscription for which you want this deployment to be hosted.
Navigate to cloud-for-sovereignty-quickstarts\workloadAccelerators\confidentialVirtualMachine\scripts\parameters\
and open confidentialVirtualMachine.parameters
in a text editor, for example VS Code.
Update the parameters and save the file. Use table for assistance.
Change directory to scripts and run deployment PowerShell command to deploy the template.
A successful deployment finishes with the following statements:
Confirm deployment completion by connecting to the Azure Portal
Connect to Azure Portal and search for your subscription in the main "Search resources, services, and docs"
Type your subscription name that you have provided above
Once you have identified your subscription, verify in Deployments
the last deployment succeeded.
Navigate to Resource Groups and find {parDeploymentPrefix}-rg
Inspect all resources created.
Confirm deployment completion by connecting to the Confidential VM
Connect to your VM through the Connect/Bastion link on its page in the Azure Portal.
Find the VM in the Azure portal, click the Connect/Go to Bastion, then enter the login credentials for the VM and selet Connect. See and for illustration. You provided the admin username in the parameters file parAdminUsername
, and you provided the password in the parameter parAdminPasswordOrKey
As the subnet was established in this deployment, remember to apply the same subnet value back to Sovereign Landing Zone using the parCustomSubnets parameter if you choose to deploy the application based on it. Failing to do so may result in an "InUseSubnetCannotBeDeleted" error when rerunning the Sovereign Landing Zone deployment script. Below is the parCustomSubnets parameter example in Sovereign Landing Zone:
Descriptions and accepted values for all parameters within the confidentialVirtualMachine.parameters.json
file are described as follows:
parDeploymentPrefix*
Prefix that is added to all resources created by this deployment.
Five characters or less, lowercase, for example: mcfs
parDeploymentLocation*
Location of the deployment.
for example: northeurope
parHubNetworkResourceId*
/subscriptions/<sub-id
>/resourceGroups
/rg-aslz-hub-network-eastus/
providers/Microsoft.Network/
virtualNetworks/hub-aslz-eastus
""
parAdminPasswordOrKey*
Password or public key (see option parAuthenticationType
) for the admin user created on Confidential VM. If password, must fulfill password complexity requirements set by SLZ policy.
P4$$w0rd!!!
parVnetAddressPrefix*
IP address space of the virtual network created for this workload, in CIDR notation. Must be unique across all vnets peered against the SLZ hub vnet as referenced above. For example, if SLZ's parHubNetworkAddressPrefix is 10.20.0.0/16, then this parameter can't be the same, for example it can be 10.21.0.0/16
10.21.0.0/16
parVmName
Name of the Confidential VM to be created. The deployed resource has a unique name suffix appended to prevent namespace clashes.
cvm
{parDeploymentPrefix} -vm-{unique-suffix}
parAdminUsername
Admin user name for the virtual machine
test-admin
{parDeploymentPrefix}-admin
parVmSize
Standard_DC2as_v5
Standard_DC2as_v5
parOsImageName
OS image for the virtual machine. Allowed values are: 'Windows Server 2022 Gen 2', 'Windows Server 2019 Gen 2', 'Ubuntu 22.04 LTS Gen 2', 'Ubuntu 20.04 LTS Gen 2'
Ubuntu 22.04 LTS Gen 2
Ubuntu 22.04 LTS Gen 2
parAttestationProvidersName
Attestation provider name. The deployed resource has a unique name suffix appended to prevent namespace clashes.
testattp
{parDeploymentPrefix} attp{unique-suffix}
parKeyVaultName
Azure Key Vault name to hold the keys for the Disk Encryption Set used for the VM disks. The deployed resource has a unique name suffix appended to prevent namespace clashes.
test-kv
{parDeploymentPrefix}-kv
parManagedIdentityName
Name of the User Assigned Managed Identity used in some RBAC scenarios (for example, for the Disk Encryption Set).
test-id
{parDeploymentPrefix}-id
parVirtualNetworkName
Virtual network name of this VM
-
{parDeploymentPrefix}-vnet
parTags
List of tags to be applied to some resources.
{'product': 'cvm-template'}
{'product': 'cvm-template'}
We provide default values for most available parameters, but you must set the parameters that are required. Refer to the table or to parameter definitions in the for allowed values. All parameters marked with *
are required. Per JSON syntax, strings are delimited by quotes, whereas numeric values and boolean values aren't.
Resource ID of the SLZ's hub virtual network from the %slzprefix%-connectivity subscription. For more information of where to retrieve this parameter value, see . Navigate to your SLZ's connectivity subscription -> Resource Groups. Select the Resource Group, which isn't NetworkWatcherRG. On the Resources page, select the virtual network resource and go to its Properties page.
Size of the Confidential VM to be created. For more information, see
In case you want to override an available from the table with a value that isn't in the parameter file, just add a JSON fragment corresponding to the value already there, for example: