About Shielded VMs


You can enable the Shielded VM service on your Compute Engine VM instances to help defend against rootkits and bootkits. Shielded VM leverages advanced platform security capabilities such as Secure Boot, Virtual trusted platform module (vTPM)-enabled Measured Boot, and Integrity monitoring.

For a more detailed overview, see Key concepts for Shielded VM.

To get started using Shielded VM, try the quickstart or see Modifying Shielded VM options.

You can monitor the integrity of your Shielded VMs in some of the following ways: