-
Automating responses to integrity validation failures
Use a Cloud Functions trigger to automatically act on Shielded VM integrity monitoring events.
-
Creating custom shielded images
Prepare the disk, generate security certificates, and enable necessary operating system (OS) features to create a custom shielded image.
-
Monitoring integrity on Shielded VMs
Use Cloud Monitoring to monitor the boot integrity of Shielded VM instances.
-
Modifying Shielded VM options
Enable and disable Shielded VM options.
-
Retrieving endorsement keys
Retrieve the public portion of an endorsement key (EKPub) from a Shielded VM instance.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates.

