Επεξεργασία

Κοινή χρήση μέσω


Introduction to Trusted launch for Azure Arc VMs on Azure Local

Applies to: Azure Local 2311.2 and later

This article introduces Trusted launch for Azure Arc virtual machines (VMs) on Azure Local. You can create a Trusted launch Arc VM using Azure portal or by using Azure Command-Line Interface (CLI).

Introduction

Trusted launch for Azure Arc VMs enables secure boot, installs a virtual Trusted Platform Module (vTPM) device, automatically transfers the vTPM state when the VM migrates or fails over to another machine within the system, and supports the ability to attest whether the VM started in a known good state.

Trusted launch is a security type that can be specified when creating Arc VMs on Azure Local. For more information, see Trusted launch for Azure Arc VMs on Azure Local.

Capabilities and benefits

Capability Benefit
Secure boot Helps reduce risk of malware (rootkits) during boot by verifying that boot components are signed by trusted publishers.
vTPM Virtualized version of a hardware TPM that serves as a dedicated vault for keys, certificates, and secrets.
vTPM state transfer Preserves vTPM when the VM migrates or fails over within a cluster.
Virtualization-based security (VBS) Guest in the VM can create isolated regions of memory using VBS support.

Note

VM guest boot integrity verification is not available.

Guidance

  • IgvmAgent is a component that is installed on all machines in the Azure Local system. It enables support for isolated VMs such as Trusted launch Arc VMs for example.

  • As part of Trusted launch Arc VM creation, Hyper-V creates VM files at a default location on disk to store the VM state. By default, access to those VM files is restricted to host server administrators only. If you store those VM files in a different location, you must ensure that the location is access restricted to host server administrators only.

  • VM live migration network traffic is not encrypted. We strongly recommend that you enable a network layer encryption technology such as IPsec to protect live migration network traffic.

Guest operating system images

All Windows 11 images (excluding 24H2 Windows 11 SKUs) and Windows Server 2022 images from Azure Marketplace supported by Azure Arc VMs are supported. See Create Azure Local VM image using Azure Marketplace images for a list of all supported Windows 11 images.

Note

VM guest images obtained outside of Azure Marketplace are not supported.

Backup and disaster recovery considerations

When working with Trusted launch Arc VMs, make sure to understand the following key considerations and limitations related to backup and recovery:

  • Differences between Trusted launch Arc VMs and standard Arc VMs: Unlike standard Azure Arc VMs, Trusted launch Arc VMs use a VM guest state protection key to protect the VM guest state, including the virtual TPM (vTPM) state, while at rest. The VM protection key is stored in a local key vault in the Azure Local system where the VM resides. Trusted launch Arc VMs store the VM guest state in two files: VM guest state and VM runtime state. To back up and restore a Trusted launch VM, a backup solution must back up and restore all the VM files, including guest state and the runtime state files, and additionally backup and restore the VM protection key.

  • Backup and disaster recovery tooling support: Currently, Trusted launch Arc VMs do not support any third-party or Microsoft-owned back up and disaster recovery tools, including but not limited to, Azure Backup, Azure Site Recovery, Veeam, and Commvault. If there arises a need to move a Trusted launch Arc TVM to an alternate cluster, see the manual process Manual backup and recovery of Trusted launch Arc VMs to manage all the necessary files and VM protection key to ensure that the VM can be successfully restored.

Note

Trusted launch Arc VMs restored on an alternate Azure Local system cannot be managed from the Azure control plane.

Next steps