Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Linux » How to create Confidential VMs in Azure
  • office365family
    How to Cancel Office 365 Family Subscription JIRA|Confluence|Apps
  • Ping request could not find the hos
    Ping request could not find the host: Verify if the name is entered correctly Windows
  • WhatsApp
    How to retrieve deleted WhatsApp messages on iPhone JIRA|Confluence|Apps
  • Feature image Install.wim file
    How To Get Install.WIM From Windows 10 Installation File Windows
  • squid proxy feature
    How to Set Up and Configure a Squid Proxy Server Linux
  • exchange 2016 1
    Remove Microsoft Exchange Server: Using ADSIEdit Tool Network | Monitoring
  • Check the BIOS version
    How to check the BIOS version on Windows Windows
  • Time machine
    How to Backup MacOS to Synology NAS via Time Machine Backup

How to create Confidential VMs in Azure

Posted on 28/02/202327/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on How to create Confidential VMs in Azure
FEATUREDC

A confidential VM is a virtual machine (VM) that uses hardware-based security technologies in protecting the data and code running inside of it from unauthorized access or tampering. In this article, you will be introduced to what a confidential virtual machine is and how to create Confidential VMs in Azure. Other useful articles can be viewed here: Enable Two-Factor Authentication for SSH in Linux and How to Install and Configure Jenkins on Windows 11 and How to determine the Remote Desktop Client App Version.

Even privileged insiders as the cloud provider or system administrator. Confidential VMs leverage trusted execution environments (TEEs), which are isolated and encrypted enclaves within the processor, to ensure that only trusted code and data can access and manipulate the confidential information stored inside them.

Benefits of Confidential Virtual Machines

Below are some benefits of Confidential Virtual Machines (VMs).

  • Confidential VMs protect sensitive data and workloads with hardware-based encryption and a Trusted Execution Environment (TEE). This reduces data breaches, unauthorized access and tampering by privileged employees.
  • Confidential VM help organizations comply with privacy and compliance regulations (GDPR, HIPAA, and PCI-DSS) as they require strict security controls for handling sensitive data. By deploying Confidential VMs, organizations can demonstrate their commitment to privacy and security.
  • Confidential VMs are adaptable and useful across a wide range of sectors and applications, as they are used in a variety of sensitive workloads, including data analytics, machine learning, financial services, healthcare, and government.
  • : When operating in encrypted settings, Confidential VMs are made to deliver high-performance computing with little overhead and latency. They are therefore perfect for demanding tasks that demand both security and efficiency.

Confidential VMs offer a strong and secure platform for delicate data and workloads in the cloud. Confidential VMs help businesses take advantage of Cloud Computing by preserving the privacy and security of customers’ data.

Create a Confidential Virtual Machines

1: On the top left-hand side of the portal, click on create a resource button

create-a-resource
Click create a resource

2. In the search bar, type “confidential VM” and select “Confidential VM” from the search results and click create on it for options

select
select from search result

3. Start with a preconfigured template

select-a
start with a preconfigured template

4. select your workload type

preconfigured
preconfigured template for production

5. On the “Create a Confidential VM” page, select your project details which include your desired subscription and resource group.

project-details
project details

6. Enter your instance details, these include the VM name, region and availability option, image

instance-details
instance details

7. Enter your Admin details

admin-account
Admin details

8. Enter your port rules

port-rules
port rules

9. Review to begin validation

review
review to validate

10. Create to begin the deployment. Wait for the deployment to be completed

wait
deployment in progress

11. Click on resource to access the VM when deployment completes

go-to-resource
deployment complete

12. Check out the details of the VM

offer

13. Connect if you need to. The port rule was ssh, click on the connect button and paste the number 4 into your PowerShell. The format is ssh username@ipaddress.

ssh techdivm@74.235.144.233
connected-to-confidential-vm
ssh connection established

Determine the hardware information for Confidential VMs

14. Hardware info

hardware-info
info

Summary of Confidential VM

A confidential VM is like every other VMs you know. It protects the data and workload with enhanced hardware-based security features.

To create one, access to the Azure marketplace has to be established by clicking on create a resource and searching with the keyword confidential VM. The steps to create one have been outlined in this article.

I hope you found this blog post helpful. In this guide, you have learned how to create Confidential VMs in Azure. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Linux Tags:Azure, security, SSH

Post navigation

Previous Post: Running PowerShell remotely on Azure VMs
Next Post: How to start HyperV VMs in safe mode

Related Posts

  • Rport
    RPORT the free and open source remote management tool Linux
  • image 166
    How to deploy a .NET application to AWS Elastic Beanstalk using AWS Tool Kit AWS/Azure/OpenShift
  • azure file share feature image
    Deploy Legacy App to Azure Fileshare AWS/Azure/OpenShift
  • FLUTTER Feature
    How to Set Up Flutter with Android Studio on Linux Linux
  • GitLab 1
    How to Setup GitLab Runner on WSL Linux
  • feature image mongo
    How to Install MongoDB on a Linux System Linux

More Related Articles

Rport RPORT the free and open source remote management tool Linux
image 166 How to deploy a .NET application to AWS Elastic Beanstalk using AWS Tool Kit AWS/Azure/OpenShift
azure file share feature image Deploy Legacy App to Azure Fileshare AWS/Azure/OpenShift
FLUTTER Feature How to Set Up Flutter with Android Studio on Linux Linux
GitLab 1 How to Setup GitLab Runner on WSL Linux
feature image mongo How to Install MongoDB on a Linux System Linux

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • office365family
    How to Cancel Office 365 Family Subscription JIRA|Confluence|Apps
  • Ping request could not find the hos
    Ping request could not find the host: Verify if the name is entered correctly Windows
  • WhatsApp
    How to retrieve deleted WhatsApp messages on iPhone JIRA|Confluence|Apps
  • Feature image Install.wim file
    How To Get Install.WIM From Windows 10 Installation File Windows
  • squid proxy feature
    How to Set Up and Configure a Squid Proxy Server Linux
  • exchange 2016 1
    Remove Microsoft Exchange Server: Using ADSIEdit Tool Network | Monitoring
  • Check the BIOS version
    How to check the BIOS version on Windows Windows
  • Time machine
    How to Backup MacOS to Synology NAS via Time Machine Backup

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.