Ensure that the Confidential Computing security feature is enabled for your Google Cloud virtual machine (VM) instances in order to add protection to your sensitive data in use by keeping it encrypted in memory and using encryption keys that Google doesn't have access to. Confidential Computing is a breakthrough technology which encrypts data while it is being processed. This technology keeps data encrypted in memory, outside the CPU.
This rule resolution is part of the Conformity solution.
excellence
Confidential Computing keeps your sensitive data encrypted while it is used, indexed, queried, or trained on, and does not allow Google to access the encryption keys (these keys are generated in hardware, per VM instance, and can't be exported). In this way, the Confidential Computing feature can help alleviate concerns about risk related to either dependency on Google Cloud infrastructure or Google insiders' access to your data in the clear.
Audit
To determine if Confidential Computing is enabled for your VM instances, perform the following operations:
Remediation / Resolution
Enabling Confidential Computing for your existing Google Cloud virtual machine (VM) instances is not supported. To turn on the feature, you have to re-create your VM instances with the appropriate configuration by performing the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Confidential Computing concepts
- Create a Confidential VM instance in the Cloud console
- Creating a Confidential VM instance
- Confidential VM locations
- Supported operating systems and machine types
- Supported operating systems
- Viewing supported images
- CIS Security Documentation
- Securing Google Cloud Computing Platform
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud compute instances list
- gcloud compute instances describe
- gcloud compute images create
- gcloud compute instances create
- gcloud compute instances delete