About Shielded VMs

You can enable the Shielded VM service on your Compute Engine VMinstances to help defend against rootkits and bootkits. Shielded VMleverages advanced platform security capabilities such asSecure Boot,Virtual trusted platform module (vTPM)-enabledMeasured Boot, andIntegrity monitoring.

For a more detailed overview, seeKey concepts for Shielded VM.

To get started using Shielded VM, try thequickstartor seeModifying Shielded VM options.

You can monitor the integrity of your Shielded VMs in some of thefollowing ways:

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-12-15 UTC.