{% extends "confidential-computing/base_confidential-computing.html" %} {% block title %}Confidential Computing{% endblock %} {% block meta_description %} Protect data in use with confidential computing. Build the foundation of your privacy-enhancing technology strategy with Ubuntu confidential VMs on both public and private clouds. {% endblock %} {% block meta_copydoc %} https://docs.google.com/document/d/1QGwS5CYlwXkaPibSFvcag6zLcUH5lNDUbM18hCqbOJM/edit {% endblock %} {% block content %}
Protect your data in use, across public and private clouds.
Ubuntu now supports Intel’s latest confidential computing technology. This hardware-based trusted execution environment enables you to add an extra layer of protection to the code and data running within your confidential virtual machines.
Canonical’s strategic partnership with Intel gives you a customised Ubuntu build for Intel®TDX, incorporating all the latest necessary end-to-end host-to-guest patches available, even before they make it upstream.
We support a 6.8 kernel, derived from the 24.04 generic kernel, and offer essential user space components accessible through PPAs, such as Libvirt 9.6, and QEMU 8.0. We also offer a set of user-friendly scripts to simplify the creation of confidential environments with just a few commands.
We support a comprehensive package, featuring a 6.8 kernel, Shim, Grub, and TDVF, which serves as an in-guest VM firmware.
Confidential VMs introduce a new trust boundary which only includes the software running within, and the platform’s hardware. All other software outside is no longer part of your trusted computing base.
To provide such strong security guarantees, confidential computing relies on two main primitives:
Confidential computing capable CPUs are equipped with an AES hardware memory encryption engine, which encrypts data when it is written to system memory, and decrypts it when read. The encryption key itself is stored in the hardware root of trust and is never exposed to the platform’s system software.
When a confidential VM is launched, its integrity is verified and its initial code and data are measured by a hardware root of trust. This ensures they have not been tampered with. The measurement is cryptographically signed and can be attested to a remote verifier.
{{ image(url="https://assets.ubuntu.com/v1/dbab00f7-Microsoft_Azure.svg", alt="Azure logo", height="22", width="22", hi_def=True, loading="lazy") | safe }}
{{ image(url="https://assets.ubuntu.com/v1/2c479064-cloud-logo%201.svg", alt="Google Cloud logo", height="22", width="120", hi_def=True, loading="lazy") | safe }}
{{ image(url="https://assets.ubuntu.com/v1/8e5cc412-AWS.svg", alt="AWS logo", height="22", width="36", hi_def=True, loading="lazy") | safe }}
While confidential VMs safeguard your workload from external threats, internal vulnerabilities within their boundaries can still pose risks. This is where Ubuntu Pro proves invaluable, ensuring your guest CVM software stack is continuously patched and up-to-date.
With confidential computing, you can remove the privileged systems software from your trusted computing base, reduce your attack surface, and get a remotely verifiable cryptographic guarantee before trusting any platform with your data.
Combine good data governance practices with the latest advances in privacy-enhancing computation. Use confidential computing to protect the confidentiality and integrity of the sensitive data hosted on your on-premises servers, using hardware-rooted primitives beyond traditional measures.