Tuesday, 14 July 2020 22:00

Google Confidential VMs keep data secure in use


Google has announced the first product in its Confidential Computing portfolio, along with a new configuration tool for government workloads.

Using encryption to keep data secure at rest (in storage) and in motion (while traversing networks) is common, and a standard part of Google Cloud.

The first of Google's Confidential Computing products, Confidential VMs encrypts data in use.

Confidential VMs are available on AMD CPUs and take advantage of the secure encrypted virtualisation supported by second-generation AMD Epyc CPUs.

The use of Epyc CPUs for Confidential VMs makes it possible to "lift and shift" applications compiled for AMD or Intel CPUs, said Google Cloud general manager and vice president of cloud security Sunil Potti.

Any and all workloads that can run on Google Cloud Platform VMs can be run in Confidential VMs by ticking a single box.

Google Confidential VM

Performance is said to be close to that of non-confidential VMs.

Initially supported operating systems include Ubuntu v18.04, Ubuntu 20.04, Container Optimized OS (COS v81), and RHEL 8.2. Other distributions including Debian are in progress.

Google Cloud will offer Intel-based Confidential VMs when that company's CPUs support encryption in use without requiring existing software to be recompiled to run in such environments.

According to Google, Confidential Computing can unlock computing scenarios which previously have not been possible. Organisations will be able to collaborate in the cloud, all while preserving the confidentiality of their data.

"Rarely do new technologies emerge that can fundamentally change the nature of cloud computing," said Google chief internet evangelist Vint Cerf.

"Confidential computing is one of those game changers that has the potential to transform the way organisations process data in the cloud, while significantly improving confidentiality and privacy."

Confidential VMs is in beta testing.

In related news, Google announced Assured Workloads for Government. Initially available only in the US, it provides a way to easily and quickly create environments that automatically enforce data location and personnel access controls.

This reduces the risk of accidental misconfigurations, saidl Potti.

Assured Workloads for Government will be rolled out in other areas, he told iTWire.

Google Assured Workloads for Government

Google's approach is to build its infrastructure for global availability, and then meet legislative requirements through software, Potti added. So customers get the full power of Google Cloud along with compliance with local laws and regulations.

Assured Workloads for Government is in private beta. and is expected to be generally available later this year.

Subscribe to Newsletter here

WEBINAR 12 AUGUST - Why is Cyber Security PR different?

This webinar is an introduction for cyber security companies and communication professionals on the nuances of cyber security public relations in the Asia Pacific.

Join Code Red Security PR Network for a virtual conversation with leading cyber security and ICT journalists, Victor Ng and Stuart Corner, on PR best practices and key success factors for effective communication in the Asian Pacific cyber security market.

You will also hear a success story testimonial from Claroty and what Code Red Security PR has achieved for the brand.

Please register here by 11 August 2020 and a confirmation email, along with instructions on how to join the webinar will be sent to you after registration.

Aug 12, 2020 01:00 PM in Canberra, Melbourne, Sydney. We look forward to seeing you there!



It's all about Webinars.

These days our customers Advertising & Marketing campaigns are mainly focussed on Webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

For covid-19 assistance we have extended terms, a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you. Please click the button below.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.





Guest Opinion

Guest Interviews

Guest Reviews

Guest Research & Case Studies

Channel News