Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Linux » How to create Confidential VMs in Azure

How to create Confidential VMs in Azure

Posted on 28/02/202327/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on How to create Confidential VMs in Azure
FEATUREDC

A confidential VM is a virtual machine (VM) that uses hardware-based security technologies in protecting the data and code running inside of it from unauthorized access or tampering. In this article, you will be introduced to what a confidential virtual machine is and how to create Confidential VMs in Azure. Other useful articles can be viewed here: Enable Two-Factor Authentication for SSH in Linux and How to Install and Configure Jenkins on Windows 11 and How to determine the Remote Desktop Client App Version.

Even privileged insiders as the cloud provider or system administrator. Confidential VMs leverage trusted execution environments (TEEs), which are isolated and encrypted enclaves within the processor, to ensure that only trusted code and data can access and manipulate the confidential information stored inside them.

Benefits of Confidential Virtual Machines

Below are some benefits of Confidential Virtual Machines (VMs).

  • Confidential VMs protect sensitive data and workloads with hardware-based encryption and a Trusted Execution Environment (TEE). This reduces data breaches, unauthorized access and tampering by privileged employees.
  • Confidential VM help organizations comply with privacy and compliance regulations (GDPR, HIPAA, and PCI-DSS) as they require strict security controls for handling sensitive data. By deploying Confidential VMs, organizations can demonstrate their commitment to privacy and security.
  • Confidential VMs are adaptable and useful across a wide range of sectors and applications, as they are used in a variety of sensitive workloads, including data analytics, machine learning, financial services, healthcare, and government.
  • : When operating in encrypted settings, Confidential VMs are made to deliver high-performance computing with little overhead and latency. They are therefore perfect for demanding tasks that demand both security and efficiency.

Confidential VMs offer a strong and secure platform for delicate data and workloads in the cloud. Confidential VMs help businesses take advantage of Cloud Computing by preserving the privacy and security of customers’ data.

Create a Confidential Virtual Machines

1: On the top left-hand side of the portal, click on create a resource button

create-a-resource
Click create a resource

2. In the search bar, type “confidential VM” and select “Confidential VM” from the search results and click create on it for options

select
select from search result

3. Start with a preconfigured template

select-a
start with a preconfigured template

4. select your workload type

preconfigured
preconfigured template for production

5. On the “Create a Confidential VM” page, select your project details which include your desired subscription and resource group.

project-details
project details

6. Enter your instance details, these include the VM name, region and availability option, image

instance-details
instance details

7. Enter your Admin details

admin-account
Admin details

8. Enter your port rules

port-rules
port rules

9. Review to begin validation

review
review to validate

10. Create to begin the deployment. Wait for the deployment to be completed

wait
deployment in progress

11. Click on resource to access the VM when deployment completes

go-to-resource
deployment complete

12. Check out the details of the VM

offer

13. Connect if you need to. The port rule was ssh, click on the connect button and paste the number 4 into your PowerShell. The format is ssh username@ipaddress.

ssh techdivm@74.235.144.233
connected-to-confidential-vm
ssh connection established

Determine the hardware information for Confidential VMs

14. Hardware info

hardware-info
info

Summary of Confidential VM

A confidential VM is like every other VMs you know. It protects the data and workload with enhanced hardware-based security features.

To create one, access to the Azure marketplace has to be established by clicking on create a resource and searching with the keyword confidential VM. The steps to create one have been outlined in this article.

I hope you found this blog post helpful. In this guide, you have learned how to create Confidential VMs in Azure. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Linux Tags:Azure, security, SSH

Post navigation

Previous Post: Running PowerShell remotely on Azure VMs
Next Post: How to start HyperV VMs in safe mode

Related Posts

  • Header image
    How to setup a Third-Party DNS Server on a Linux Server Linux
  • Locate Find and Grep Required 1
    A Brief Introduction to Linux and How to Create Disk Partition in Ubuntu Linux Linux
  • DNS FEATURE
    Domain Name System: All you need to know about DNS Linux
  • MM
    How to install Mattermost on Ubuntu and Debian Linux
  • Ec2 Instance
    How to create an EC2 Instance AWS/Azure/OpenShift
  • Screenshot 2022 03 15 at 10.05.53
    VMware Workstation states: What are the differences between Suspend, Power Off, and Run in Background Linux

More Related Articles

Header image How to setup a Third-Party DNS Server on a Linux Server Linux
Locate Find and Grep Required 1 A Brief Introduction to Linux and How to Create Disk Partition in Ubuntu Linux Linux
DNS FEATURE Domain Name System: All you need to know about DNS Linux
MM How to install Mattermost on Ubuntu and Debian Linux
Ec2 Instance How to create an EC2 Instance AWS/Azure/OpenShift
Screenshot 2022 03 15 at 10.05.53 VMware Workstation states: What are the differences between Suspend, Power Off, and Run in Background Linux

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • image 6
    Set Browers and Windows to reopen Apps on Startup Windows
  • image
    How to find Computer Serial Number stated change to be filled by OEM Windows Server
  • linux w640 h400
    How to install and configure Ubuntu Linux on VirtualBox Linux
  • shortcut
    How to make a desktop shortcut available for all users in Windows 7 and 10 Windows
  • How To Backup Your WordPress Database banner
    How to Backup and Restore your WordPress Files and Database Backup
  • Create Multiboot OS ISO files on a single bootable USB Disk
    Create Multiboot OS ISO files on a single bootable USB Disk Windows
  • WMi tools   WMI Explorer
    Query and display Windows information via WMI Explorer Network | Monitoring
  • How to Upgrade Windows 10 with an Unsupported CPU TPM 1.0 to Windows 11
    Upgrading from Windows 10 with Unsupported CPU and TPM 1.0 Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,823 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.