aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Computing
  • Platforms

Start Your Ubuntu Confidential VM With Intel® TDX On Google Cloud

  • aster.cloud
  • September 20, 2023
  • 3 minute read

Confidential computing directly addresses the question of trust between cloud providers and their customers, with guarantees of data security for guest machines enforced by the underlying hardware of the cloud. According to the Confidential Computing Consortium, confidential computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment.

The close technical collaboration between Canonical and Google Cloud ensures that Ubuntu is optimised for Google Cloud operations at scale. Confidential Computing requires multiple pieces to align and we are delighted to offer full Ubuntu support for this crucial capability with Google Cloud. Organizations gain peace of mind that large classes of attacks on cloud guests are mitigated by Confidential Computing.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Intel® Trust Domain Extensions (Intel® TDX)

As an active contributor in confidential computing domain, Intel introduced Intel® Trust Domain Extensions (TDX) to its confidential computing portfolio with the launch of its new 4th Gen Xeon enterprise processors in January, 2023. Intel® Trust Domain Extensions is a combination of hardware and software features that provide isolation and security for virtual machines (VMs) running on Intel processors. Intel® TDX introduces architectural innovations to enable the deployment of hardware-isolated virtual machines (VMs), known as trust domains (TDs). The primary objective of Intel® TDX is to create a robust isolation layer between TDs and the virtual-machine manager (VMM)/hypervisor, as well as other non-TD software, offering comprehensive protection against a wide spectrum of potential threats. These hardware-isolated TDs encompass several critical components, including the Secure-Arbitration Mode (SEAM), which hosts the Intel® TDX module, an Intel-provided, digitally-signed security-services module. Additional features of TDX include:

  • the shared bit in the GPA, 
  • Secure EPT for address-translation integrity, 
  • the Physical-address-metadata table (PAMT) for page management, 
  • the Intel Total Memory Encryption-Multi Key (Intel TME-MK) engine for memory encryption and integrity, 
  • remote attestation 
Read More  Monitoring GPU Workloads On GKE With NVIDIA Data Center GPU Manager (DCGM)

All of the features are integral to ensuring the security and trustworthiness of TD execution within the Intel® TDX system.

In essence, Intel® TDX, a feature accompanying the latest 4th Generation Intel® Xeon CPUs, empowers you to execute your workloads within a logically isolated hardware-based execution environment in Google Compute Engine C3 machines. This remarkable capability is achieved through TDX’s allocation of a dedicated segment of system memory, which undergoes real-time encryption via an advanced AES-128 encryption engine. Additionally, TDX introduces stringent access control measures that meticulously govern memory access, effectively thwarting external access, including from the cloud’s privileged system software.

How Ubuntu supports Intel® TDX

Intel® TDX requires multiple pieces in the operating system to align with Intel CPUs. Ubuntu supports Intel® TDX through the Linux Stack for Intel® TDX. The Linux stack, denoting the strata of software constituting the Linux operating system, encompasses critical layers:

  • The kernel: At its nucleus, the kernel serves as the foundational pillar of the operating system, furnishing essential services upon which all other software builds.
  • Device drivers: These specialised software components act as intermediaries, facilitating seamless communication between the operating system and the hardware devices within the system.
  • System libraries: An arsenal of system libraries offers a repertoire of shared functions that find widespread utility across applications.
  • Userspace applications: At the outermost realm, userspace applications emerge as the tangible interface through which users engage directly with the system’s functionalities.

How to start your Ubuntu Confidential VM with Intel® TDX on Google Cloud

To get started with confidential computing on Google Cloud Intel® TDX, in the Google Cloud CLI, use instance create subcommand and specify — confidential-compute-type=TDX to select new C3 machines series that uses 4th Gen Intel® Xeon Scalable CPUs and enable Intel® TDX technology. Such as:

gcloud alpha compute instances create INSTANCE_NAME \
  --machine-type MACHINE_TYPE --zone us-central1-a \
  --confidential-compute-type=TDX \
  --on-host-maintenance=TERMINATE \
  --image-family=IMAGE_FAMILY_NAME \
  --image-project=IMAGE_PROJECT \
  --project PROJECT_NAME

Where:

  • MACHINE_TYPE is the C3 machine type to use.
  • IMAGE_FAMILY_NAME is the name of the Confidential VM-supported image family to use, such as Ubuntu 22.04 LTS and Ubuntu 22.04 LTS Pro Server.
Read More  Role Of Containers & Microservices In Revolutionizing IT And Telecom Sector

In a few seconds, you will enjoy the latest advancements in security technology.

Additional resources for confidential computing:

  • Read our blog post: What is confidential computing? A high-level explanation for CISOs (https://canonical.com/blog/what-is-confidential-computing-a-high-level-explanation-for-cisos)
  • Read our blog post: Confidential computing in public clouds: isolation and remote attestation explained (https://canonical.com/blog/confidential-computing-in-public-clouds-isolation-and-remote-attestation-explained)

By: Hugo Huang
Originally published at: Canonical Blog

Source: cyberpogo.com


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Canonical
  • Confidential Computing
  • Google Cloud
  • Intel
  • Ubuntu
  • Virtual Machine
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pure Accelerate 2025: All the news and updates live from Las Vegas

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

What is cloud bursting?

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

What is confidential computing?

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Oracle adds xAI Grok models to OCI

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Fine-tune your storage-as-a-service approach

  • June 16, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Global cloud spending might be booming, but AWS is trailing Microsoft and Google

  • June 13, 2025

Stay Connected!
LATEST
  • 1
    Pure Accelerate 2025: All the news and updates live from Las Vegas
    • June 18, 2025
  • 2
    ‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management
    • June 18, 2025
  • What is cloud bursting?
    • June 18, 2025
  • 4
    There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it
    • June 17, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 8
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 9
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 10
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 3
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 5
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.