📃
Confidential Computing 101
HomeTechnologyTry CC!
  • Welcome
  • Confidential Computing
    • What is Confidential Computing
    • What problems Confidential Computing solves
      • Bare Metal
      • Docker
      • Kubernetes
      • Knative
    • Why Confidential Computing
    • How Confidential Computing works
      • Memory Encryption
      • Workload Attestation
      • Confidential Boot
      • Sealing / Binding
      • Secret Provisioning
    • Technology Overview
    • Cloud Service Providers
  • Technology in depth
    • Intel SGX
      • Getting Started
        • Bare Metal Server Installation
        • Enclave Development Environment
        • Intel SGX SDK Setup
      • Technology
        • 🎭Features
        • 💂Threat Model
        • 🆚Versions
        • 🟦Concepts
          • 🏦Memory Encryption
          • 👮Local and Remote Attestation
          • 🖼️DCAP-Attestation Framework
          • 🔑Secret Key Provisioning
      • enclaive Development Kit
        • 🏢Architecture
        • 🌪️Workflow
        • 🌍Tutorials
          • Azure DCdsv3, DCsv2, or DCsv3 Setup
          • Redis in cK8s
          • MongoDB in cK8s
          • K8s + HashiCorp Vault on Azure DCsv3
      • Vault Remote Attestation Plug-In
        • 🏃‍♂️Initialization
        • 👮Attestation
        • ⚙️Configuration
    • Intel TDX
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
          • VT
          • TME/MKTME
          • SGX
        • Features
        • Threat Model
        • Concepts
          • Architecture
            • TDX Module
          • Memory Encryption
            • Confidentiality and Integrity
            • Keys and Key Management
          • TD Partitioning
          • DCAP-Attestation
            • Overview
            • Platform Registration
            • Attestation Report
    • AMD SEV
      • Getting Started
        • Azure
        • AWS
        • GCP
      • Technology
        • History
        • Threat Model
        • SME Concepts
          • Use Models
        • SEV-SNP Concepts
          • Features
            • Integrity Threats
            • Reverse Map Table
            • Page Validation
            • Page States
            • Virtual Machine Privilege Levels
            • Interrupt/Exception Protection
            • Trusted Platform Information
            • TCB Versioning
            • VM Launch & Attestation
            • VM Migration
            • Side Channels
          • Use Cases
          • Architecture
            • Encrypted Memory
            • Key Management
          • Software Implications
    • ARM CC
      • Technology
        • Introduction
        • Threat Model
        • Design
        • Comparison
    • Attestation Methods
      • Raw Attestation
      • Raw Attestation with Secure-Boot
      • Raw Attestation with a vTPM
        • AMD Secure VM Service Module and vTPMs
      • Raw Attestation with paravirtualized TPM
  • Resources
    • Youtube
    • Github
    • Products
Powered by GitBook
On this page
  • Before you begin
  • Create an instance
  • Enable higher network bandwidth for C2D machine types

Was this helpful?

  1. Technology in depth
  2. AMD SEV
  3. Getting Started

GCP

Last updated 11 months ago

Was this helpful?

You can create a Confidential VM instance as part of creating a new Compute Engine virtual machine.

Before you begin

Before creating a Confidential VM instance, you need to set up your environment as follows:

  1. If you're new to Google Cloud, to evaluate how our products perform in real-world scenarios. New customers get $300 in free credits to run, test, and deploy workloads.

  2. In the Google Cloud console, on the project selector page, select or .

    Note: If you don't plan to keep the resources that you create in this procedure, create a project instead of selecting an existing project. After you finish these steps, you can delete the project, removing all resources associated with the project.

  3. .

  4. Enable the Compute Engine API.

  5. Optional: To use the gcloud CLI examples in this guide:

    • Install or update to the latest version of the .

    • that .

  6. Optional: To use the API examples in this guide, for your requests. Learn more about .

Create an instance

To create an SEV Confidential VM with the Google Cloud console, complete the following steps.

  1. In the Google Cloud console, go to the VM instances page.

  2. Click Create instance.

  3. In the Confidential VM service section, click Enable.

  4. In the Enable Confidential Computing dialog, review the list of settings that are updated when you enable the service. They can include the following fields, if they were set to incompatible values.

  5. Click Enable.

  6. In the Machine configuration section, expand Advanced configurations.

  7. For the CPU platform, choose AMD Milan or later.

  8. Verify that you are satisfied with these settings, and then click Create.

Enable higher network bandwidth for C2D machine types

Note: To create an SEV-SNP () Confidential VM instance, use the gcloud CLI or REST API.

Series and Machine type. For more information, see .

Region and zone. For more information, see .

Boot disk image. For more information, see .

On-host maintenance. For more information, see .

Network interface card. For more information, see .

After you click Create, the VM instances page opens. On this page you can view the status and details for your new instance. When an Available icon appears in the Status column for your Confidential VM instance, it's ready to use.

The three largest C2D Compute Engine VM shapes (32, 56, and 112) support high-bandwidth networking. When you select a Tier 1 network bandwidth configuration, the data transfer out bandwidth increases from the default 32 Gbps to 50 or 100 Gbps. To achieve the higher Tier 1 bandwidth speeds, the instance must be running the . Learn more about .

create an account
create a Google Cloud project
Go to project selector
Make sure that billing is enabled for your Google Cloud project
Enable the API
gcloud CLI
Set a default region and zone for your client
supports Confidential VM
set up authentication
OAuth 2.0
Preview
Go to VM instances
Machine types, CPUs, and zones
Machine types, CPUs, and zones
Operating systems
Set host maintenance policy of a VM
Using Google Virtual NIC
gVNIC virtual network driver
configuring a VM with higher bandwidth