Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Linux » How to create Confidential VMs in Azure

How to create Confidential VMs in Azure

Posted on 28/02/202327/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on How to create Confidential VMs in Azure
FEATUREDC

A confidential VM is a virtual machine (VM) that uses hardware-based security technologies in protecting the data and code running inside of it from unauthorized access or tampering. In this article, you will be introduced to what a confidential virtual machine is and how to create Confidential VMs in Azure. Other useful articles can be viewed here: Enable Two-Factor Authentication for SSH in Linux and How to Install and Configure Jenkins on Windows 11 and How to determine the Remote Desktop Client App Version.

Even privileged insiders as the cloud provider or system administrator. Confidential VMs leverage trusted execution environments (TEEs), which are isolated and encrypted enclaves within the processor, to ensure that only trusted code and data can access and manipulate the confidential information stored inside them.

Benefits of Confidential Virtual Machines

Below are some benefits of Confidential Virtual Machines (VMs).

  • Confidential VMs protect sensitive data and workloads with hardware-based encryption and a Trusted Execution Environment (TEE). This reduces data breaches, unauthorized access and tampering by privileged employees.
  • Confidential VM help organizations comply with privacy and compliance regulations (GDPR, HIPAA, and PCI-DSS) as they require strict security controls for handling sensitive data. By deploying Confidential VMs, organizations can demonstrate their commitment to privacy and security.
  • Confidential VMs are adaptable and useful across a wide range of sectors and applications, as they are used in a variety of sensitive workloads, including data analytics, machine learning, financial services, healthcare, and government.
  • : When operating in encrypted settings, Confidential VMs are made to deliver high-performance computing with little overhead and latency. They are therefore perfect for demanding tasks that demand both security and efficiency.

Confidential VMs offer a strong and secure platform for delicate data and workloads in the cloud. Confidential VMs help businesses take advantage of Cloud Computing by preserving the privacy and security of customers’ data.

Create a Confidential Virtual Machines

1: On the top left-hand side of the portal, click on create a resource button

create-a-resource
Click create a resource

2. In the search bar, type “confidential VM” and select “Confidential VM” from the search results and click create on it for options

select
select from search result

3. Start with a preconfigured template

select-a
start with a preconfigured template

4. select your workload type

preconfigured
preconfigured template for production

5. On the “Create a Confidential VM” page, select your project details which include your desired subscription and resource group.

project-details
project details

6. Enter your instance details, these include the VM name, region and availability option, image

instance-details
instance details

7. Enter your Admin details

admin-account
Admin details

8. Enter your port rules

port-rules
port rules

9. Review to begin validation

review
review to validate

10. Create to begin the deployment. Wait for the deployment to be completed

wait
deployment in progress

11. Click on resource to access the VM when deployment completes

go-to-resource
deployment complete

12. Check out the details of the VM

offer

13. Connect if you need to. The port rule was ssh, click on the connect button and paste the number 4 into your PowerShell. The format is ssh username@ipaddress.

ssh techdivm@74.235.144.233
connected-to-confidential-vm
ssh connection established

Determine the hardware information for Confidential VMs

14. Hardware info

hardware-info
info

Summary of Confidential VM

A confidential VM is like every other VMs you know. It protects the data and workload with enhanced hardware-based security features.

To create one, access to the Azure marketplace has to be established by clicking on create a resource and searching with the keyword confidential VM. The steps to create one have been outlined in this article.

I hope you found this blog post helpful. In this guide, you have learned how to create Confidential VMs in Azure. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Linux Tags:Azure, security, SSH

Post navigation

Previous Post: Running PowerShell remotely on Azure VMs
Next Post: How to start HyperV VMs in safe mode

Related Posts

  • Storage Explorer
    How to Install Azure Storage Explorer on Windows AWS/Azure/OpenShift
  • microsoft azure new logo 2017 e1572843284943
    Pass-Through Authentication: Azure AD Connect Tool status displays inactive AWS/Azure/OpenShift
  • Set a Resource Delete Lock
    How to Add a Delete Lock on Azure Resources AWS/Azure/OpenShift
  • image 36
    Keepalive Settings: Understanding keepalive configuration Linux
  • dsdfg
    Create a Bootable USB Drive Using dd Command on Linux Linux
  • image 19
    Download your MySQL database from Azure to a local PC with MySQL Workbench AWS/Azure/OpenShift

More Related Articles

Storage Explorer How to Install Azure Storage Explorer on Windows AWS/Azure/OpenShift
microsoft azure new logo 2017 e1572843284943 Pass-Through Authentication: Azure AD Connect Tool status displays inactive AWS/Azure/OpenShift
Set a Resource Delete Lock How to Add a Delete Lock on Azure Resources AWS/Azure/OpenShift
image 36 Keepalive Settings: Understanding keepalive configuration Linux
dsdfg Create a Bootable USB Drive Using dd Command on Linux Linux
image 19 Download your MySQL database from Azure to a local PC with MySQL Workbench AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • 1237968 3d79
    How to perform sysprep in Windows Windows
  • gitlab56789iuj
    Error unregistering Runner from GitLab: Forbidden with Docker Executor Network | Monitoring
  • schedulepythontasksinWindows
    Run Python Script via Windows Task Scheduler Windows
  • Grammarly integration with Word on Mac
    Integrate Grammarly in Microsoft Word on Mac Network | Monitoring
  • zoom feature
    How to install Zoom video conference software on Linux System Linux
  • OpenVz
    OpenVZ template on Proxmox Server: How to Guide Virtualization
  • 1 kAUgwdVYmcVgUSXiwUkObw
    Error 0x801c001d – Automatic registration failed: Failed to look up the registration service from AD Windows Server
  • article 1280x720.192a2586 1 1
    Fix Error 0xc1510111: You do not have permission to mount and modify this image Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,824 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.