Some or all of the information on this page might not apply to Trusted Cloud by S3NS.
About Shielded VMs
You can enable the Shielded VM service on your Compute Engine VM
instances to help defend against rootkits and bootkits. Shielded VM
leverages advanced platform security capabilities such as
Secure Boot,
Virtual trusted platform module (vTPM)-enabled
Measured Boot, and
Integrity monitoring.
For a more detailed overview, see
Key concepts for Shielded VM.
To get started using Shielded VM, try the
quickstart
or see
Modifying Shielded VM options.
You can monitor the integrity of your Shielded VMs in some of the
following ways:
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-07-02 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-07-02 UTC."],[[["Shielded VM on Compute Engine enhances security against rootkits and bootkits."],["Shielded VM uses Secure Boot, vTPM-enabled Measured Boot, and Integrity monitoring."],["You can monitor the boot integrity of Shielded VM instances using Cloud Monitoring."],["Cloud Run functions can be used to automate actions in response to integrity monitoring events."]]],[]]