Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Google Hardens Cloud Workloads With Shielded VMs

Google has shared more details on the

Google has shared more details on the recently released Shielded VMs, a new offering designed for securing workloads running on the Google Cloud Platform (GCP).

Available in beta, Shielded VMs were designed ensure that boot malware and firmware rootkits haven’t penetrated workloads running on the GCP. When paired with Titan Security Key, Shielded VMs can also ensure that, even after boot, the virtual machines run code that hasn’t been compromised.

Security features available in Shielded VMs include Unified Extended Firmware Interface (UEFI) 2.3.1 (replacing legacy BIOS sub-systems and enabling UEFI Secure Boot capability), vTPM (a virtual Trusted Platform Module to validate guest VM pre-boot and boot integrity), Secure Boot and Measured Boot, and measurements collected as part of Measured Boot available via Stackdriver.

Secure and Measured Boot ensure that the VM boots a known firmware and kernel software stack and also provide a detailed picture of the integrity of the VM boot process, while vTPM provides guest VM instances with cryptographic functionality.

Shielded VMs, Google says, should protect systems from attack vectors such as malicious insiders within your organization, guest system firmware via malicious guest firmware, and guest OS through malicious guest-VM kernel or user-mode vulnerabilities.

Shielded VMs are available for the following Google-curated images: Windows Server 2012 R2 (Core and Datacenter), Windows Server 2016 (Core and Datacenter), Windows Server version 1709 Datacenter Core, Windows server version 1803 Datacenter Core, Container-Optimized OS 68+, and Ubuntu 1804.

To also provide strong, low-cost cryptographic capabilities to customers, Google has paired Shielded VMs with the vTPM crypto processor. The adoption of Trusted Platform Module (TPM) devices is on the rise, and the virtual TPM (vTPM) service should offer TPM functionality to guest VM instances, Google says.

vTPM “complies with the TPM 2.0 specification using FIPS 140-2 L1 certified cryptography. This means our vTPM should work identically to any existing TPMs you may be using on your operating systems,” Google explains.

Advertisement. Scroll to continue reading.

vTPM, which is based on the source code of the TPM 2.0 spec, has been tested and is officially supported with several instances of Google’s Container-Optimized OS, as well as with the Google-curated images Shielded VMs are available for.

To ensure the integrity of code running on its servers, Google is verifying boot integrity by requiring cryptographic signatures over low-level components such as the BIOS, bootloader, kernel, and base operating system image. The company also requires that all code running in production should be reviewed and approved by an engineer other than the author.

“This will allow us to establish a hardware root of trust that we can chain all the way to vTPM— not something that TPMs typically do,” Google says.

Customers can create a VM instance GCP console to receive more granular control over Shielded VMs functionality. All options are enabled by default, but they can be adjusted in the VM instance details page or by using gcloud APIs.

“Shielded VMs UEFI firmware, Secure Boot, Measured Boot, vTPMs and Integrity Monitoring offer integrity verification and enforcement of your VM boot system, giving you confidence in your business-critical cloud workloads,” Google concludes.

Related: Google Announces New Security Tools for Cloud Customers

Related: Google Launches “Asylo” Framework for Confidential Computing

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.