Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security, Veeam & DevOps

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
  1. Home
  2. Breadcrumb-Yoast

[wpseo_breadcrumb]

How to create Confidential VMs in Azure

Posted on 28/02/202327/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on How to create Confidential VMs in Azure
  1. Home
  2. AWS/Azure/OpenShift
  3. How to create Confidential VMs in Azure
FEATUREDC

A confidential VM is a virtual machine (VM) that uses hardware-based security technologies in protecting the data and code running inside of it from unauthorized access or tampering. In this article, you will be introduced to what a confidential virtual machine is and how to create Confidential VMs in Azure. Other useful articles can be viewed here: Enable Two-Factor Authentication for SSH in Linux and How to Install and Configure Jenkins on Windows 11 and How to determine the Remote Desktop Client App Version.

Even privileged insiders as the cloud provider or system administrator. Confidential VMs leverage trusted execution environments (TEEs), which are isolated and encrypted enclaves within the processor, to ensure that only trusted code and data can access and manipulate the confidential information stored inside them.

Benefits of Confidential Virtual Machines

Below are some benefits of Confidential Virtual Machines (VMs).

  • Confidential VMs protect sensitive data and workloads with hardware-based encryption and a Trusted Execution Environment (TEE). This reduces data breaches, unauthorized access and tampering by privileged employees.
  • Confidential VM help organizations comply with privacy and compliance regulations (GDPR, HIPAA, and PCI-DSS) as they require strict security controls for handling sensitive data. By deploying Confidential VMs, organizations can demonstrate their commitment to privacy and security.
  • Confidential VMs are adaptable and useful across a wide range of sectors and applications, as they are used in a variety of sensitive workloads, including data analytics, machine learning, financial services, healthcare, and government.
  • : When operating in encrypted settings, Confidential VMs are made to deliver high-performance computing with little overhead and latency. They are therefore perfect for demanding tasks that demand both security and efficiency.

Confidential VMs offer a strong and secure platform for delicate data and workloads in the cloud. Confidential VMs help businesses take advantage of Cloud Computing by preserving the privacy and security of customers’ data.

Create a Confidential Virtual Machines

1: On the top left-hand side of the portal, click on create a resource button

create-a-resource
Click create a resource

2. In the search bar, type “confidential VM” and select “Confidential VM” from the search results and click create on it for options

select
select from search result

3. Start with a preconfigured template

select-a
start with a preconfigured template

4. select your workload type

preconfigured
preconfigured template for production

5. On the “Create a Confidential VM” page, select your project details which include your desired subscription and resource group.

project-details
project details

6. Enter your instance details, these include the VM name, region and availability option, image

instance-details
instance details

7. Enter your Admin details

admin-account
Admin details

8. Enter your port rules

port-rules
port rules

9. Review to begin validation

review
review to validate

10. Create to begin the deployment. Wait for the deployment to be completed

wait
deployment in progress

11. Click on resource to access the VM when deployment completes

go-to-resource
deployment complete

12. Check out the details of the VM

offer

13. Connect if you need to. The port rule was ssh, click on the connect button and paste the number 4 into your PowerShell. The format is ssh username@ipaddress.

ssh techdivm@74.235.144.233
connected-to-confidential-vm
ssh connection established

Determine the hardware information for Confidential VMs

14. Hardware info

hardware-info
info

Summary of Confidential VM

A confidential VM is like every other VMs you know. It protects the data and workload with enhanced hardware-based security features.

To create one, access to the Azure marketplace has to be established by clicking on create a resource and searching with the keyword confidential VM. The steps to create one have been outlined in this article.

I hope you found this blog post helpful. In this guide, you have learned how to create Confidential VMs in Azure. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Linux Tags:Azure, security, SSH

Post navigation

Previous Post: Running PowerShell remotely on Azure VMs
Next Post: How to start HyperV VMs in safe mode

Related Posts

  • feature image app services
    How to Migrate Azure Web Apps AWS/Azure/OpenShift
  • prometheus feature image
    How to use Prometheus for Monitoring Linux
  • Screenshot 2020 05 13 at 19.23.25
    AWS Command-Line Interface: How to configure AWS CLI [Part 1] AWS/Azure/OpenShift
  • Screenshot 2020 05 14 at 17.47.09
    Configure OpenSSH Server: A Quick Guide Linux
  • featuredimage
    Create App Service Resource with Azure CLI AWS/Azure/OpenShift
  • AzureCloudShell
    Provisioning Azure Resources using Azure Az PowerShell Cmdlet from Cloud Shell AWS/Azure/OpenShift

More Related Articles

feature image app services How to Migrate Azure Web Apps AWS/Azure/OpenShift
prometheus feature image How to use Prometheus for Monitoring Linux
Screenshot 2020 05 13 at 19.23.25 AWS Command-Line Interface: How to configure AWS CLI [Part 1] AWS/Azure/OpenShift
Screenshot 2020 05 14 at 17.47.09 Configure OpenSSH Server: A Quick Guide Linux
featuredimage Create App Service Resource with Azure CLI AWS/Azure/OpenShift
AzureCloudShell Provisioning Azure Resources using Azure Az PowerShell Cmdlet from Cloud Shell AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • xyxc
    How to link a removable media to a Deployment Share: Replicate Deployment share to a removable device Windows Server
  • image 73
    How to manage and use Amazon S3 access points using the AWS Management Console AWS/Azure/OpenShift
  • Schedule and join Teams Meeting
    How to schedule and join meetings with Microsoft Teams JIRA|Confluence|Apps
  • ghm
    MDT Driver injection: How to import drivers in .exe format into Microsoft Deployment Toolkit Windows Server
  • RDP
    The connection was denied because the user is not authorized for remote Login: Enable Remote Desktop Connection on Windows 11 for non-administrators or selected users Windows
  • download
    How to import Users and Groups into Pleasant Password Manager Password Manager
  • Featured image samp
    How to use Windows 11 PC Health Check App Windows
  • HypervDisplay
    How to fix HyperV Virtual Machine display taking over the entire screen Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,803 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.