Stay organized with collectionsSave and categorize content based on your preferences.
A Confidential Space image is a minimal, single-purpose OS that's run on aConfidential VMinstance. It's
designed to run a singleworkloadonly once, without
persistent storage. That workload is layered on top of the Confidential Space image
usingDocker.
Confidential Space images are built on the existing security enhancements ofContainer-Optimized OSand add the following benefits:
Encrypted disk partitions with integrity protection
Authenticated, encrypted network connections
Various boot measurements
Disabled remote access and cloud-specific tooling
Types of images
Confidential Space images are available in two variants:
Production: The production image is used for running real production workloads
with real production data. It is locked down to prevent the workload operator
from accessing the processed data. For more information, seeConfidential Space security overview.
Debug: The debug image is used fortesting your workloadon non-production
data. SSH is enabled on the debug image, and the operator has root access to
the VM that runs the workload. The VM running the debug image doesn't stop
after the workload is complete.
When you create a Confidential VM using a Confidential Space image, the latest version
of the image is used. If you always delete your Confidential VM when your workload
is done and create a new one each time you run the workload, then you can be
sure the image is up to date.
However, long-running workloads or running a workload on a VM created in the
past opens you up to the risk of using an outdated Confidential Space image, which
might introduce security vulnerabilities.
To mitigate this, a data collaborator canuse support attributesto check if a production Confidential Space image version running on a VM is
recent, and deny it access to their data if it doesn't pass.
There are three support attributes:
LATEST: This is the latest version of the image, and is supported and
monitored for vulnerabilities. TheLATESTimage is alsoSTABLEandUSABLE.
STABLE: This version of the image is supported and monitored for
vulnerabilities. ASTABLEimage is alsoUSABLE.
USABLE: An image with only this attribute is out of support. Use it at your
own risk.
Image versions
You can view the latest Confidential Space images with the followinggcloudcommand:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eConfidential Space images are minimal, single-purpose operating systems designed to run a single workload on a Confidential VM without persistent storage, layered with Docker.\u003c/p\u003e\n"],["\u003cp\u003eThese images enhance security through encrypted disk partitions, authenticated and encrypted network connections, boot measurements, and disabled remote access, building on Container-Optimized OS.\u003c/p\u003e\n"],["\u003cp\u003eTwo types of Confidential Space images are available: Production images, used for secure data processing, and Debug images, used for testing with root access and enabled SSH.\u003c/p\u003e\n"],["\u003cp\u003eProduction images have support attributes like \u003ccode\u003eLATEST\u003c/code\u003e, \u003ccode\u003eSTABLE\u003c/code\u003e, and \u003ccode\u003eUSABLE\u003c/code\u003e to indicate their status and vulnerability monitoring, while Debug images do not have these attributes.\u003c/p\u003e\n"],["\u003cp\u003eYou can use \u003ccode\u003egcloud compute images list\u003c/code\u003e commands with specific flags to view and filter available Confidential Space images, including production, debug, and deprecated versions.\u003c/p\u003e\n"]]],[],null,["*** ** * ** ***\n\nA Confidential Space image is a minimal, single-purpose OS that's run on a\n[Confidential VM](/confidential-computing/confidential-vm/docs/confidential-vm-overview) instance. It's\ndesigned to run a single\n[workload](/confidential-computing/confidential-space/docs/create-customize-workloads) only once, without\npersistent storage. That workload is layered on top of the Confidential Space image\nusing [Docker](https://www.docker.com/).\n\nConfidential Space images are built on the existing security enhancements of\n[Container-Optimized OS](/container-optimized-os/docs)\nand add the following benefits:\n\n- Encrypted disk partitions with integrity protection\n\n- Authenticated, encrypted network connections\n\n- Various boot measurements\n\n- Disabled remote access and cloud-specific tooling\n\nTypes of images\n\nConfidential Space images are available in two variants:\n\n- Production: The production image is used for running real production workloads\n with real production data. It is locked down to prevent the workload operator\n from accessing the processed data. For more information, see\n [Confidential Space security overview](/docs/security/confidential-space).\n\n- Debug: The debug image is used for\n [testing your workload](/confidential-computing/confidential-space/docs/monitor-debug) on non-production\n data. SSH is enabled on the debug image, and the operator has root access to\n the VM that runs the workload. The VM running the debug image doesn't stop\n after the workload is complete.\n\nYou can set which image type to use when you\n[deploy the workload](/confidential-computing/confidential-space/docs/deploy-workloads).\n\nConfidential Space image lifecycle\n\nWhen you create a Confidential VM using a Confidential Space image, the latest version\nof the image is used. If you always delete your Confidential VM when your workload\nis done and create a new one each time you run the workload, then you can be\nsure the image is up to date.\n\nHowever, long-running workloads or running a workload on a VM created in the\npast opens you up to the risk of using an outdated Confidential Space image, which\nmight introduce security vulnerabilities.\n\nTo mitigate this, a data collaborator can\n[use support attributes](/confidential-computing/confidential-space/docs/create-grant-access-confidential-resources?tab=image-assertions#support_attributes)\nto check if a production Confidential Space image version running on a VM is\nrecent, and deny it access to their data if it doesn't pass.\n\nThere are three support attributes:\n\n- `LATEST`: This is the latest version of the image, and is supported and\n monitored for vulnerabilities. The `LATEST` image is also `STABLE` and\n `USABLE`.\n\n- `STABLE`: This version of the image is supported and monitored for\n vulnerabilities. A `STABLE` image is also `USABLE`.\n\n- `USABLE`: An image with only this attribute is out of support. Use it at your\n own risk.\n\n| **Note:** Debug images don't have support attributes. When testing workloads, data collaborators need to remove checks for support attributes from their workload identity pools.\n\nImage versions\n\nYou can view the latest Confidential Space images with the following `gcloud`\ncommand: \n\n gcloud compute images list \\\n --project=confidential-space-images \\\n --no-standard-images\n\nThe following flags can change the returned images in the results:\n\n- Add the `--show-deprecated` flag to show older images.\n\n- Add `--filter=\"family~'confidential-space$'\"` flag to show production images.\n\n- Add `--filter=\"family~'confidential-space-debug$'\"` flag to show debug images.\n\nThe following tables detail the available Confidential Space image versions and\ntheir support attributes.\n\nProduction images\n\nThe following table contains Confidential Space image production versions.\n\n| Image name | Container-Optimized OS version | Released |\n|---------------------------|--------------------------------|------------|\n| `LATEST` image |||\n| confidential-space-250800 | cos-tdx-113-18244-382-54 | 2025-09-02 |\n| `STABLE` images |||\n| confidential-space-250301 | cos-tdx-113-18244-291-63 | 2025-03-31 |\n| confidential-space-250300 | cos-tdx-113-18244-291-46 | 2025-03-31 |\n| confidential-space-250100 | cos-113-18244-236-88 | 2025-01-14 |\n| confidential-space-241000 | cos-113-18244-151-96 | 2024-10-18 |\n| confidential-space-240900 | cos-113-18244-151-80 | 2024-10-01 |\n| confidential-space-240800 | cos-113-18244-151-14 | 2024-09-03 |\n| confidential-space-240700 | cos-113-18244-85-54 | 2024-07-31 |\n| confidential-space-240500 | cos-dev-117-18374-0-0 | 2024-05-30 |\n| confidential-space-240402 | cos-dev-117-18342-0-0 | 2024-04-22 |\n| confidential-space-240200 | cos-dev-113-18146-0-0 | 2024-02-28 |\n| confidential-space-231201 | cos-dev-113-18059-0-0 | 2023-12-14 |\n| confidential-space-231200 | cos-dev-113-18054-0-0 | 2023-12-05 |\n| confidential-space-231001 | cos-dev-113-17965-0-0 | 2023-11-03 |\n| confidential-space-230901 | cos-dev-113-17877-0-0 | 2023-10-02 |\n| confidential-space-230600 | cos-dev-109-17637-0-0 | 2023-06-09 |\n| confidential-space-2302-0 | cos-dev-105-17234-0-0 | 2023-03-02 |\n| confidential-space-2212-0 | cos-dev-105-17234-0-0 | 2022-12-01 |\n\nDebug images\n\nThe following table contains Confidential Space image debug versions.\n\n| Image name | Container-Optimized OS version | Released |\n|---------------------------------|--------------------------------|------------|\n| confidential-space-debug-250800 | cos-tdx-113-18244-382-54 | 2025-09-02 |\n| confidential-space-debug-250301 | cos-tdx-113-18244-291-63 | 2025-03-31 |\n| confidential-space-debug-250300 | cos-tdx-113-18244-291-46 | 2025-03-31 |\n| confidential-space-debug-250100 | cos-113-18244-236-88 | 2025-01-14 |\n| confidential-space-debug-241000 | cos-113-18244-151-96 | 2024-10-01 |\n| confidential-space-debug-240900 | cos-113-18244-151-80 | 2024-10-01 |\n| confidential-space-debug-240800 | cos-113-18244-151-14 | 2024-09-03 |\n| confidential-space-debug-240700 | cos-113-18244-85-54 | 2024-07-31 |\n| confidential-space-debug-240500 | cos-dev-117-18374-0-0 | 2024-05-30 |\n| confidential-space-debug-240402 | cos-dev-117-18342-0-0 | 2024-04-22 |\n| confidential-space-debug-240200 | cos-dev-113-18146-0-0 | 2024-02-28 |\n| confidential-space-debug-231201 | cos-dev-113-18059-0-0 | 2023-12-14 |\n| confidential-space-debug-231200 | cos-dev-113-18054-0-0 | 2023-12-05 |\n| confidential-space-debug-231001 | cos-dev-113-17965-0-0 | 2023-11-03 |\n| confidential-space-debug-230901 | cos-dev-113-17877-0-0 | 2023-10-02 |\n| confidential-space-debug-230600 | cos-dev-109-17637-0-0 | 2023-06-09 |\n| confidential-space-debug-2302-0 | cos-dev-105-17234-0-0 | 2023-03-02 |\n| confidential-space-debug-2212-0 | cos-dev-105-17234-0-0 | 2022-12-01 |"]]