Shielded VM documentation

Shielded VM provides verifiable integrity of your Compute Engine VM instances, so you can be confident that your instances haven't been compromised by boot- or kernel-level malware or rootkits.

Go to the Shielded VM product page for more.

Documentation resources

Find quickstarts and guides, review key references, and get help with common issues.