aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Computing
  • Platforms

Start Your Ubuntu Confidential VM With Intel® TDX On Google Cloud

  • aster.cloud
  • September 20, 2023
  • 3 minute read

Confidential computing directly addresses the question of trust between cloud providers and their customers, with guarantees of data security for guest machines enforced by the underlying hardware of the cloud. According to the Confidential Computing Consortium, confidential computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment.

The close technical collaboration between Canonical and Google Cloud ensures that Ubuntu is optimised for Google Cloud operations at scale. Confidential Computing requires multiple pieces to align and we are delighted to offer full Ubuntu support for this crucial capability with Google Cloud. Organizations gain peace of mind that large classes of attacks on cloud guests are mitigated by Confidential Computing.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Intel® Trust Domain Extensions (Intel® TDX)

As an active contributor in confidential computing domain, Intel introduced Intel® Trust Domain Extensions (TDX) to its confidential computing portfolio with the launch of its new 4th Gen Xeon enterprise processors in January, 2023. Intel® Trust Domain Extensions is a combination of hardware and software features that provide isolation and security for virtual machines (VMs) running on Intel processors. Intel® TDX introduces architectural innovations to enable the deployment of hardware-isolated virtual machines (VMs), known as trust domains (TDs). The primary objective of Intel® TDX is to create a robust isolation layer between TDs and the virtual-machine manager (VMM)/hypervisor, as well as other non-TD software, offering comprehensive protection against a wide spectrum of potential threats. These hardware-isolated TDs encompass several critical components, including the Secure-Arbitration Mode (SEAM), which hosts the Intel® TDX module, an Intel-provided, digitally-signed security-services module. Additional features of TDX include:

  • the shared bit in the GPA, 
  • Secure EPT for address-translation integrity, 
  • the Physical-address-metadata table (PAMT) for page management, 
  • the Intel Total Memory Encryption-Multi Key (Intel TME-MK) engine for memory encryption and integrity, 
  • remote attestation 
Read More  How Google Cloud BigQuery Enables Big DevOps At JFrog

All of the features are integral to ensuring the security and trustworthiness of TD execution within the Intel® TDX system.

In essence, Intel® TDX, a feature accompanying the latest 4th Generation Intel® Xeon CPUs, empowers you to execute your workloads within a logically isolated hardware-based execution environment in Google Compute Engine C3 machines. This remarkable capability is achieved through TDX’s allocation of a dedicated segment of system memory, which undergoes real-time encryption via an advanced AES-128 encryption engine. Additionally, TDX introduces stringent access control measures that meticulously govern memory access, effectively thwarting external access, including from the cloud’s privileged system software.

How Ubuntu supports Intel® TDX

Intel® TDX requires multiple pieces in the operating system to align with Intel CPUs. Ubuntu supports Intel® TDX through the Linux Stack for Intel® TDX. The Linux stack, denoting the strata of software constituting the Linux operating system, encompasses critical layers:

  • The kernel: At its nucleus, the kernel serves as the foundational pillar of the operating system, furnishing essential services upon which all other software builds.
  • Device drivers: These specialised software components act as intermediaries, facilitating seamless communication between the operating system and the hardware devices within the system.
  • System libraries: An arsenal of system libraries offers a repertoire of shared functions that find widespread utility across applications.
  • Userspace applications: At the outermost realm, userspace applications emerge as the tangible interface through which users engage directly with the system’s functionalities.

How to start your Ubuntu Confidential VM with Intel® TDX on Google Cloud

To get started with confidential computing on Google Cloud Intel® TDX, in the Google Cloud CLI, use instance create subcommand and specify — confidential-compute-type=TDX to select new C3 machines series that uses 4th Gen Intel® Xeon Scalable CPUs and enable Intel® TDX technology. Such as:

gcloud alpha compute instances create INSTANCE_NAME \
  --machine-type MACHINE_TYPE --zone us-central1-a \
  --confidential-compute-type=TDX \
  --on-host-maintenance=TERMINATE \
  --image-family=IMAGE_FAMILY_NAME \
  --image-project=IMAGE_PROJECT \
  --project PROJECT_NAME

Where:

  • MACHINE_TYPE is the C3 machine type to use.
  • IMAGE_FAMILY_NAME is the name of the Confidential VM-supported image family to use, such as Ubuntu 22.04 LTS and Ubuntu 22.04 LTS Pro Server.
Read More  Cache Is king: Announcing Lower Pricing For Cloud CDN

In a few seconds, you will enjoy the latest advancements in security technology.

Additional resources for confidential computing:

  • Read our blog post: What is confidential computing? A high-level explanation for CISOs (https://canonical.com/blog/what-is-confidential-computing-a-high-level-explanation-for-cisos)
  • Read our blog post: Confidential computing in public clouds: isolation and remote attestation explained (https://canonical.com/blog/confidential-computing-in-public-clouds-isolation-and-remote-attestation-explained)

By: Hugo Huang
Originally published at: Canonical Blog

Source: cyberpogo.com


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Canonical
  • Confidential Computing
  • Google Cloud
  • Intel
  • Ubuntu
  • Virtual Machine
You May Also Like
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • Computing
  • Public Cloud
  • Technology

United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services

  • April 15, 2025
Microsoft’s Majorana 1 chip carves new path for quantum computing
View Post
  • Computing
  • Technology

Microsoft’s Majorana 1 chip carves new path for quantum computing

  • February 19, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
CES 2025: Intel Shows Off Its AI Tech
View Post
  • Computing
  • Technology

CES 2025: Intel Shows Off Its AI Tech

  • January 23, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024
Cloud platforms among the clouds
View Post
  • Computing
  • Learning
  • Public Cloud

Best Cloud Platforms Offering Free Trials for Cloud Mastery

  • December 23, 2024
Google Cloud and Smart Communications
View Post
  • Platforms
  • Technology

Smart Communications, Inc. Dials into Google Cloud AI to Help Personalize Digital Services for Filipinos

  • October 25, 2024

Stay Connected!
LATEST
  • notta-ai-header 1
    Notta vs Fireflies: Which AI Transcription Tool Deserves Your Attention in 2025?
    • May 16, 2025
  • college-of-cardinals-2025 2
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 3
    The World Is Revalidating Itself
    • May 6, 2025
  • oracle-ibm 4
    IBM and Oracle Expand Partnership to Advance Agentic AI and Hybrid Cloud
    • May 6, 2025
  • 5
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 6
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 7
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 8
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 9
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 10
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 2
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
  • 3
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 4
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 5
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.